May 13 00:41:40.864766 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:41:40.864784 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:41:40.864793 kernel: BIOS-provided physical RAM map: May 13 00:41:40.864799 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:41:40.864804 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:41:40.864809 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:41:40.864816 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:41:40.864821 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:41:40.864827 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:41:40.864833 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:41:40.864839 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 13 00:41:40.864844 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:41:40.864849 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:41:40.864872 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:41:40.864879 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:41:40.864886 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:41:40.864892 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:41:40.864898 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:41:40.864903 kernel: NX (Execute Disable) protection: active May 13 00:41:40.864909 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:41:40.864915 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:41:40.864921 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:41:40.864926 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:41:40.864932 kernel: extended physical RAM map: May 13 00:41:40.864938 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:41:40.864945 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:41:40.864950 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:41:40.864956 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:41:40.864962 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:41:40.864968 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:41:40.864973 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:41:40.864979 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 13 00:41:40.864985 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 13 00:41:40.864990 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 13 00:41:40.864996 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 13 00:41:40.865002 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 13 00:41:40.865017 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:41:40.865022 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:41:40.865028 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:41:40.865034 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:41:40.865042 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:41:40.865049 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:41:40.865055 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:41:40.865062 kernel: efi: EFI v2.70 by EDK II May 13 00:41:40.865068 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 13 00:41:40.865075 kernel: random: crng init done May 13 00:41:40.865081 kernel: SMBIOS 2.8 present. May 13 00:41:40.865087 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 13 00:41:40.865093 kernel: Hypervisor detected: KVM May 13 00:41:40.865100 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:41:40.865106 kernel: kvm-clock: cpu 0, msr 1b196001, primary cpu clock May 13 00:41:40.865112 kernel: kvm-clock: using sched offset of 4040713563 cycles May 13 00:41:40.865120 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:41:40.865127 kernel: tsc: Detected 2794.748 MHz processor May 13 00:41:40.865133 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:41:40.865140 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:41:40.865146 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 13 00:41:40.865153 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:41:40.865159 kernel: Using GB pages for direct mapping May 13 00:41:40.865165 kernel: Secure boot disabled May 13 00:41:40.865172 kernel: ACPI: Early table checksum verification disabled May 13 00:41:40.865180 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 13 00:41:40.865187 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 13 00:41:40.865193 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865200 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865206 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 13 00:41:40.865212 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865219 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865225 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865231 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:41:40.865239 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 13 00:41:40.865245 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 13 00:41:40.865251 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 13 00:41:40.865258 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 13 00:41:40.865264 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 13 00:41:40.865270 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 13 00:41:40.865277 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 13 00:41:40.865283 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 13 00:41:40.865289 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 13 00:41:40.865296 kernel: No NUMA configuration found May 13 00:41:40.865303 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 13 00:41:40.865309 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 13 00:41:40.865315 kernel: Zone ranges: May 13 00:41:40.865322 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:41:40.865328 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 13 00:41:40.865334 kernel: Normal empty May 13 00:41:40.865341 kernel: Movable zone start for each node May 13 00:41:40.865347 kernel: Early memory node ranges May 13 00:41:40.865355 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 13 00:41:40.865361 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 13 00:41:40.865367 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 13 00:41:40.865374 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 13 00:41:40.865380 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 13 00:41:40.865386 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 13 00:41:40.865392 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 13 00:41:40.865399 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:41:40.865405 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 13 00:41:40.865411 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 13 00:41:40.865419 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:41:40.865425 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 13 00:41:40.865432 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 13 00:41:40.865438 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 13 00:41:40.865444 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:41:40.865450 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:41:40.865457 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:41:40.865463 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:41:40.865469 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:41:40.865477 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:41:40.865484 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:41:40.865490 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:41:40.865496 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:41:40.865503 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:41:40.865509 kernel: TSC deadline timer available May 13 00:41:40.865515 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:41:40.865522 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:41:40.865528 kernel: kvm-guest: setup PV sched yield May 13 00:41:40.865535 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 13 00:41:40.865542 kernel: Booting paravirtualized kernel on KVM May 13 00:41:40.865554 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:41:40.865562 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:41:40.865569 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:41:40.865576 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:41:40.865582 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:41:40.865589 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:41:40.865595 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 13 00:41:40.865602 kernel: kvm-guest: PV spinlocks enabled May 13 00:41:40.865609 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:41:40.865615 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 13 00:41:40.865623 kernel: Policy zone: DMA32 May 13 00:41:40.865631 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:41:40.865638 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:41:40.865645 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:41:40.865653 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:41:40.865660 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:41:40.865667 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 13 00:41:40.865674 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:41:40.865680 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:41:40.865687 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:41:40.865693 kernel: rcu: Hierarchical RCU implementation. May 13 00:41:40.865701 kernel: rcu: RCU event tracing is enabled. May 13 00:41:40.865708 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:41:40.865716 kernel: Rude variant of Tasks RCU enabled. May 13 00:41:40.865723 kernel: Tracing variant of Tasks RCU enabled. May 13 00:41:40.865730 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:41:40.865736 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:41:40.865743 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:41:40.865750 kernel: Console: colour dummy device 80x25 May 13 00:41:40.865756 kernel: printk: console [ttyS0] enabled May 13 00:41:40.865763 kernel: ACPI: Core revision 20210730 May 13 00:41:40.865770 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:41:40.865778 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:41:40.865785 kernel: x2apic enabled May 13 00:41:40.865791 kernel: Switched APIC routing to physical x2apic. May 13 00:41:40.865798 kernel: kvm-guest: setup PV IPIs May 13 00:41:40.865805 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:41:40.865811 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:41:40.865818 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 13 00:41:40.865825 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:41:40.865832 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:41:40.865839 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:41:40.865846 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:41:40.865872 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:41:40.865879 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:41:40.865886 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:41:40.865892 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:41:40.865899 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:41:40.865907 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:41:40.865913 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:41:40.865922 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:41:40.865928 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:41:40.865935 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:41:40.865942 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:41:40.865949 kernel: Freeing SMP alternatives memory: 32K May 13 00:41:40.865955 kernel: pid_max: default: 32768 minimum: 301 May 13 00:41:40.865962 kernel: LSM: Security Framework initializing May 13 00:41:40.865968 kernel: SELinux: Initializing. May 13 00:41:40.865975 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:41:40.865983 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:41:40.865990 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:41:40.866016 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:41:40.866023 kernel: ... version: 0 May 13 00:41:40.866030 kernel: ... bit width: 48 May 13 00:41:40.866036 kernel: ... generic registers: 6 May 13 00:41:40.866043 kernel: ... value mask: 0000ffffffffffff May 13 00:41:40.866049 kernel: ... max period: 00007fffffffffff May 13 00:41:40.866056 kernel: ... fixed-purpose events: 0 May 13 00:41:40.866065 kernel: ... event mask: 000000000000003f May 13 00:41:40.866071 kernel: signal: max sigframe size: 1776 May 13 00:41:40.866078 kernel: rcu: Hierarchical SRCU implementation. May 13 00:41:40.866085 kernel: smp: Bringing up secondary CPUs ... May 13 00:41:40.866092 kernel: x86: Booting SMP configuration: May 13 00:41:40.866098 kernel: .... node #0, CPUs: #1 May 13 00:41:40.866105 kernel: kvm-clock: cpu 1, msr 1b196041, secondary cpu clock May 13 00:41:40.866112 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:41:40.866118 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 13 00:41:40.866126 kernel: #2 May 13 00:41:40.866133 kernel: kvm-clock: cpu 2, msr 1b196081, secondary cpu clock May 13 00:41:40.866140 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:41:40.866146 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 13 00:41:40.866153 kernel: #3 May 13 00:41:40.866160 kernel: kvm-clock: cpu 3, msr 1b1960c1, secondary cpu clock May 13 00:41:40.866166 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:41:40.866173 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 13 00:41:40.866179 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:41:40.866188 kernel: smpboot: Max logical packages: 1 May 13 00:41:40.866194 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 13 00:41:40.866201 kernel: devtmpfs: initialized May 13 00:41:40.866208 kernel: x86/mm: Memory block size: 128MB May 13 00:41:40.866215 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 13 00:41:40.866222 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 13 00:41:40.866229 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 13 00:41:40.866235 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 13 00:41:40.866243 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 13 00:41:40.866251 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:41:40.866258 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:41:40.866265 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:41:40.866272 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:41:40.866279 kernel: audit: initializing netlink subsys (disabled) May 13 00:41:40.866285 kernel: audit: type=2000 audit(1747096900.899:1): state=initialized audit_enabled=0 res=1 May 13 00:41:40.866292 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:41:40.866299 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:41:40.866306 kernel: cpuidle: using governor menu May 13 00:41:40.866314 kernel: ACPI: bus type PCI registered May 13 00:41:40.866320 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:41:40.866327 kernel: dca service started, version 1.12.1 May 13 00:41:40.866334 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:41:40.866341 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:41:40.866348 kernel: PCI: Using configuration type 1 for base access May 13 00:41:40.866355 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:41:40.866361 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:41:40.866368 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:41:40.866376 kernel: ACPI: Added _OSI(Module Device) May 13 00:41:40.866383 kernel: ACPI: Added _OSI(Processor Device) May 13 00:41:40.866389 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:41:40.866396 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:41:40.866403 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:41:40.866410 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:41:40.866416 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:41:40.866423 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:41:40.866430 kernel: ACPI: Interpreter enabled May 13 00:41:40.866438 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:41:40.866445 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:41:40.866452 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:41:40.866459 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:41:40.866466 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:41:40.866576 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:41:40.866650 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:41:40.866719 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:41:40.866730 kernel: PCI host bridge to bus 0000:00 May 13 00:41:40.866870 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:41:40.866936 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:41:40.866998 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:41:40.867068 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:41:40.867129 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:41:40.867189 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 13 00:41:40.867254 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:41:40.867334 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:41:40.867413 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:41:40.867482 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 13 00:41:40.867552 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 13 00:41:40.867621 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 13 00:41:40.867693 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 13 00:41:40.867762 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:41:40.867838 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:41:40.867961 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 13 00:41:40.868040 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 13 00:41:40.868109 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 13 00:41:40.868184 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:41:40.868254 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 13 00:41:40.868324 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 13 00:41:40.868393 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 13 00:41:40.868472 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:41:40.868567 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 13 00:41:40.868648 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 13 00:41:40.868734 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 13 00:41:40.868868 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 13 00:41:40.868948 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:41:40.869027 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:41:40.869104 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:41:40.869173 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 13 00:41:40.869242 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 13 00:41:40.869326 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:41:40.869396 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 13 00:41:40.869405 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:41:40.869412 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:41:40.869419 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:41:40.869426 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:41:40.869433 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:41:40.869440 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:41:40.869446 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:41:40.869455 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:41:40.869462 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:41:40.869469 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:41:40.869476 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:41:40.869482 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:41:40.869490 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:41:40.869498 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:41:40.869505 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:41:40.869513 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:41:40.869522 kernel: iommu: Default domain type: Translated May 13 00:41:40.869529 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:41:40.869598 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:41:40.869664 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:41:40.869731 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:41:40.869740 kernel: vgaarb: loaded May 13 00:41:40.869747 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:41:40.869754 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:41:40.869763 kernel: PTP clock support registered May 13 00:41:40.869769 kernel: Registered efivars operations May 13 00:41:40.869776 kernel: PCI: Using ACPI for IRQ routing May 13 00:41:40.869783 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:41:40.869790 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 13 00:41:40.869796 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 13 00:41:40.869803 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 13 00:41:40.869810 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 13 00:41:40.869816 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 13 00:41:40.869824 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 13 00:41:40.869831 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:41:40.869837 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:41:40.869844 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:41:40.869863 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:41:40.869871 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:41:40.869877 kernel: pnp: PnP ACPI init May 13 00:41:40.869955 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:41:40.869967 kernel: pnp: PnP ACPI: found 6 devices May 13 00:41:40.869974 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:41:40.869981 kernel: NET: Registered PF_INET protocol family May 13 00:41:40.869987 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:41:40.869994 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:41:40.870001 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:41:40.870016 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:41:40.870023 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:41:40.870029 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:41:40.870038 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:41:40.870045 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:41:40.870051 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:41:40.870058 kernel: NET: Registered PF_XDP protocol family May 13 00:41:40.870131 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 13 00:41:40.870203 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 13 00:41:40.870267 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:41:40.870328 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:41:40.870391 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:41:40.870453 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:41:40.870513 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:41:40.870576 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 13 00:41:40.870584 kernel: PCI: CLS 0 bytes, default 64 May 13 00:41:40.870591 kernel: Initialise system trusted keyrings May 13 00:41:40.870598 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:41:40.870605 kernel: Key type asymmetric registered May 13 00:41:40.870612 kernel: Asymmetric key parser 'x509' registered May 13 00:41:40.870620 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:41:40.870627 kernel: io scheduler mq-deadline registered May 13 00:41:40.870644 kernel: io scheduler kyber registered May 13 00:41:40.870652 kernel: io scheduler bfq registered May 13 00:41:40.870659 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:41:40.870666 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:41:40.870674 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:41:40.870681 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:41:40.870688 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:41:40.870696 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:41:40.870703 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:41:40.870711 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:41:40.870718 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:41:40.870790 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:41:40.870801 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:41:40.870874 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:41:40.870937 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:41:40 UTC (1747096900) May 13 00:41:40.871012 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:41:40.871022 kernel: efifb: probing for efifb May 13 00:41:40.871029 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 13 00:41:40.871036 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 13 00:41:40.871043 kernel: efifb: scrolling: redraw May 13 00:41:40.871050 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 13 00:41:40.871057 kernel: Console: switching to colour frame buffer device 160x50 May 13 00:41:40.871064 kernel: fb0: EFI VGA frame buffer device May 13 00:41:40.871074 kernel: pstore: Registered efi as persistent store backend May 13 00:41:40.871081 kernel: NET: Registered PF_INET6 protocol family May 13 00:41:40.871088 kernel: Segment Routing with IPv6 May 13 00:41:40.871095 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:41:40.871104 kernel: NET: Registered PF_PACKET protocol family May 13 00:41:40.871111 kernel: Key type dns_resolver registered May 13 00:41:40.871119 kernel: IPI shorthand broadcast: enabled May 13 00:41:40.871127 kernel: sched_clock: Marking stable (579172334, 128300769)->(723870484, -16397381) May 13 00:41:40.871134 kernel: registered taskstats version 1 May 13 00:41:40.871141 kernel: Loading compiled-in X.509 certificates May 13 00:41:40.871148 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:41:40.871155 kernel: Key type .fscrypt registered May 13 00:41:40.871162 kernel: Key type fscrypt-provisioning registered May 13 00:41:40.871169 kernel: pstore: Using crash dump compression: deflate May 13 00:41:40.871176 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:41:40.871185 kernel: ima: Allocated hash algorithm: sha1 May 13 00:41:40.871192 kernel: ima: No architecture policies found May 13 00:41:40.871199 kernel: clk: Disabling unused clocks May 13 00:41:40.871206 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:41:40.871214 kernel: Write protecting the kernel read-only data: 28672k May 13 00:41:40.871221 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:41:40.871228 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:41:40.871235 kernel: Run /init as init process May 13 00:41:40.871242 kernel: with arguments: May 13 00:41:40.871250 kernel: /init May 13 00:41:40.871257 kernel: with environment: May 13 00:41:40.871264 kernel: HOME=/ May 13 00:41:40.871271 kernel: TERM=linux May 13 00:41:40.871278 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:41:40.871287 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:41:40.871296 systemd[1]: Detected virtualization kvm. May 13 00:41:40.871304 systemd[1]: Detected architecture x86-64. May 13 00:41:40.871313 systemd[1]: Running in initrd. May 13 00:41:40.871320 systemd[1]: No hostname configured, using default hostname. May 13 00:41:40.871328 systemd[1]: Hostname set to . May 13 00:41:40.871336 systemd[1]: Initializing machine ID from VM UUID. May 13 00:41:40.871343 systemd[1]: Queued start job for default target initrd.target. May 13 00:41:40.871351 systemd[1]: Started systemd-ask-password-console.path. May 13 00:41:40.871358 systemd[1]: Reached target cryptsetup.target. May 13 00:41:40.871365 systemd[1]: Reached target paths.target. May 13 00:41:40.871374 systemd[1]: Reached target slices.target. May 13 00:41:40.871381 systemd[1]: Reached target swap.target. May 13 00:41:40.871389 systemd[1]: Reached target timers.target. May 13 00:41:40.871397 systemd[1]: Listening on iscsid.socket. May 13 00:41:40.871404 systemd[1]: Listening on iscsiuio.socket. May 13 00:41:40.871412 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:41:40.871420 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:41:40.871428 systemd[1]: Listening on systemd-journald.socket. May 13 00:41:40.871436 systemd[1]: Listening on systemd-networkd.socket. May 13 00:41:40.871444 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:41:40.871451 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:41:40.871459 systemd[1]: Reached target sockets.target. May 13 00:41:40.871467 systemd[1]: Starting kmod-static-nodes.service... May 13 00:41:40.871474 systemd[1]: Finished network-cleanup.service. May 13 00:41:40.871482 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:41:40.871489 systemd[1]: Starting systemd-journald.service... May 13 00:41:40.871497 systemd[1]: Starting systemd-modules-load.service... May 13 00:41:40.871514 systemd[1]: Starting systemd-resolved.service... May 13 00:41:40.871522 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:41:40.871532 systemd[1]: Finished kmod-static-nodes.service. May 13 00:41:40.871539 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:41:40.871547 kernel: audit: type=1130 audit(1747096900.863:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.871555 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:41:40.871563 kernel: audit: type=1130 audit(1747096900.867:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.871573 systemd-journald[198]: Journal started May 13 00:41:40.871612 systemd-journald[198]: Runtime Journal (/run/log/journal/1f694a9a3c1f4d1498f7e9036b215f1a) is 6.0M, max 48.4M, 42.4M free. May 13 00:41:40.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.871533 systemd-modules-load[199]: Inserted module 'overlay' May 13 00:41:40.874541 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:41:40.876889 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:41:40.879202 systemd[1]: Started systemd-journald.service. May 13 00:41:40.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.882868 kernel: audit: type=1130 audit(1747096900.879:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.883010 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:41:40.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.892237 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:41:40.896817 kernel: audit: type=1130 audit(1747096900.888:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.896837 kernel: audit: type=1130 audit(1747096900.893:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.893251 systemd-resolved[200]: Positive Trust Anchors: May 13 00:41:40.893260 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:41:40.893296 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:41:40.898836 systemd-resolved[200]: Defaulting to hostname 'linux'. May 13 00:41:40.905808 systemd[1]: Starting dracut-cmdline.service... May 13 00:41:40.909525 systemd[1]: Started systemd-resolved.service. May 13 00:41:40.913998 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:41:40.914031 kernel: audit: type=1130 audit(1747096900.911:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.913995 systemd[1]: Reached target nss-lookup.target. May 13 00:41:40.916265 kernel: Bridge firewalling registered May 13 00:41:40.916223 systemd-modules-load[199]: Inserted module 'br_netfilter' May 13 00:41:40.917245 dracut-cmdline[215]: dracut-dracut-053 May 13 00:41:40.919573 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:41:40.936877 kernel: SCSI subsystem initialized May 13 00:41:40.948216 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:41:40.948239 kernel: device-mapper: uevent: version 1.0.3 May 13 00:41:40.948253 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:41:40.952130 systemd-modules-load[199]: Inserted module 'dm_multipath' May 13 00:41:40.952792 systemd[1]: Finished systemd-modules-load.service. May 13 00:41:40.957692 kernel: audit: type=1130 audit(1747096900.953:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.957448 systemd[1]: Starting systemd-sysctl.service... May 13 00:41:40.964370 systemd[1]: Finished systemd-sysctl.service. May 13 00:41:40.968719 kernel: audit: type=1130 audit(1747096900.963:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:40.999894 kernel: Loading iSCSI transport class v2.0-870. May 13 00:41:41.016927 kernel: iscsi: registered transport (tcp) May 13 00:41:41.038876 kernel: iscsi: registered transport (qla4xxx) May 13 00:41:41.038897 kernel: QLogic iSCSI HBA Driver May 13 00:41:41.066570 systemd[1]: Finished dracut-cmdline.service. May 13 00:41:41.077701 kernel: audit: type=1130 audit(1747096901.073:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.077722 systemd[1]: Starting dracut-pre-udev.service... May 13 00:41:41.122889 kernel: raid6: avx2x4 gen() 29277 MB/s May 13 00:41:41.139872 kernel: raid6: avx2x4 xor() 7456 MB/s May 13 00:41:41.156882 kernel: raid6: avx2x2 gen() 32069 MB/s May 13 00:41:41.176878 kernel: raid6: avx2x2 xor() 19071 MB/s May 13 00:41:41.346879 kernel: raid6: avx2x1 gen() 26428 MB/s May 13 00:41:41.363883 kernel: raid6: avx2x1 xor() 15130 MB/s May 13 00:41:41.380881 kernel: raid6: sse2x4 gen() 14225 MB/s May 13 00:41:41.397877 kernel: raid6: sse2x4 xor() 6892 MB/s May 13 00:41:41.414882 kernel: raid6: sse2x2 gen() 15618 MB/s May 13 00:41:41.431879 kernel: raid6: sse2x2 xor() 9721 MB/s May 13 00:41:41.448876 kernel: raid6: sse2x1 gen() 12142 MB/s May 13 00:41:41.466279 kernel: raid6: sse2x1 xor() 7710 MB/s May 13 00:41:41.466314 kernel: raid6: using algorithm avx2x2 gen() 32069 MB/s May 13 00:41:41.466324 kernel: raid6: .... xor() 19071 MB/s, rmw enabled May 13 00:41:41.467010 kernel: raid6: using avx2x2 recovery algorithm May 13 00:41:41.478871 kernel: xor: automatically using best checksumming function avx May 13 00:41:41.565880 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:41:41.572453 systemd[1]: Finished dracut-pre-udev.service. May 13 00:41:41.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.573000 audit: BPF prog-id=7 op=LOAD May 13 00:41:41.573000 audit: BPF prog-id=8 op=LOAD May 13 00:41:41.574321 systemd[1]: Starting systemd-udevd.service... May 13 00:41:41.585488 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 13 00:41:41.589959 systemd[1]: Started systemd-udevd.service. May 13 00:41:41.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.591056 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:41:41.601330 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation May 13 00:41:41.622988 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:41:41.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.812257 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:41:41.844992 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:41:41.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:41.871249 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:41:41.878247 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:41:41.878263 kernel: GPT:9289727 != 19775487 May 13 00:41:41.878274 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:41:41.878286 kernel: GPT:9289727 != 19775487 May 13 00:41:41.878302 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:41:41.878313 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:41:41.881875 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:41:41.884874 kernel: libata version 3.00 loaded. May 13 00:41:41.892882 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:41:41.895090 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:41:41.941156 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:41:41.941173 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:41:41.941259 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:41:41.941335 kernel: AES CTR mode by8 optimization enabled May 13 00:41:41.941345 kernel: scsi host0: ahci May 13 00:41:41.941429 kernel: scsi host1: ahci May 13 00:41:41.941522 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (451) May 13 00:41:41.941531 kernel: scsi host2: ahci May 13 00:41:41.941615 kernel: scsi host3: ahci May 13 00:41:41.941691 kernel: scsi host4: ahci May 13 00:41:41.941771 kernel: scsi host5: ahci May 13 00:41:41.941846 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 13 00:41:41.941870 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 13 00:41:41.941879 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 13 00:41:41.941891 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 13 00:41:41.941899 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 13 00:41:41.941907 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 13 00:41:41.916009 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:41:41.923901 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:41:41.925270 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:41:41.935355 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:41:41.950538 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:41:41.953328 systemd[1]: Starting disk-uuid.service... May 13 00:41:41.959302 disk-uuid[536]: Primary Header is updated. May 13 00:41:41.959302 disk-uuid[536]: Secondary Entries is updated. May 13 00:41:41.959302 disk-uuid[536]: Secondary Header is updated. May 13 00:41:41.962880 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:41:41.965882 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:41:42.255887 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:41:42.255969 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:41:42.257376 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:41:42.257465 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:41:42.258872 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:41:42.259880 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:41:42.260880 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:41:42.262268 kernel: ata3.00: applying bridge limits May 13 00:41:42.262278 kernel: ata3.00: configured for UDMA/100 May 13 00:41:42.262871 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:41:42.291870 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:41:42.309347 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:41:42.309360 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:41:42.966884 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:41:42.967209 disk-uuid[537]: The operation has completed successfully. May 13 00:41:42.989358 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:41:42.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:42.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:42.989437 systemd[1]: Finished disk-uuid.service. May 13 00:41:42.996030 systemd[1]: Starting verity-setup.service... May 13 00:41:43.009880 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:41:43.028872 systemd[1]: Found device dev-mapper-usr.device. May 13 00:41:43.031332 systemd[1]: Mounting sysusr-usr.mount... May 13 00:41:43.034406 systemd[1]: Finished verity-setup.service. May 13 00:41:43.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.093885 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:41:43.094469 systemd[1]: Mounted sysusr-usr.mount. May 13 00:41:43.094885 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:41:43.095516 systemd[1]: Starting ignition-setup.service... May 13 00:41:43.097024 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:41:43.105570 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:41:43.105596 kernel: BTRFS info (device vda6): using free space tree May 13 00:41:43.105605 kernel: BTRFS info (device vda6): has skinny extents May 13 00:41:43.112912 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:41:43.122033 systemd[1]: Finished ignition-setup.service. May 13 00:41:43.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.123344 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:41:43.156334 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:41:43.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.157000 audit: BPF prog-id=9 op=LOAD May 13 00:41:43.158511 systemd[1]: Starting systemd-networkd.service... May 13 00:41:43.161113 ignition[650]: Ignition 2.14.0 May 13 00:41:43.161122 ignition[650]: Stage: fetch-offline May 13 00:41:43.161167 ignition[650]: no configs at "/usr/lib/ignition/base.d" May 13 00:41:43.161177 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:43.161263 ignition[650]: parsed url from cmdline: "" May 13 00:41:43.161266 ignition[650]: no config URL provided May 13 00:41:43.161270 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:41:43.161275 ignition[650]: no config at "/usr/lib/ignition/user.ign" May 13 00:41:43.161290 ignition[650]: op(1): [started] loading QEMU firmware config module May 13 00:41:43.161294 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:41:43.169739 ignition[650]: op(1): [finished] loading QEMU firmware config module May 13 00:41:43.183648 systemd-networkd[719]: lo: Link UP May 13 00:41:43.183659 systemd-networkd[719]: lo: Gained carrier May 13 00:41:43.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.184100 systemd-networkd[719]: Enumeration completed May 13 00:41:43.184168 systemd[1]: Started systemd-networkd.service. May 13 00:41:43.184668 systemd[1]: Reached target network.target. May 13 00:41:43.184865 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:41:43.186310 systemd-networkd[719]: eth0: Link UP May 13 00:41:43.186313 systemd-networkd[719]: eth0: Gained carrier May 13 00:41:43.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.186530 systemd[1]: Starting iscsiuio.service... May 13 00:41:43.191838 systemd[1]: Started iscsiuio.service. May 13 00:41:43.193368 systemd[1]: Starting iscsid.service... May 13 00:41:43.196843 iscsid[726]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:41:43.196843 iscsid[726]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:41:43.196843 iscsid[726]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:41:43.196843 iscsid[726]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:41:43.196843 iscsid[726]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:41:43.196843 iscsid[726]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:41:43.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.197352 systemd[1]: Started iscsid.service. May 13 00:41:43.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.198490 systemd[1]: Starting dracut-initqueue.service... May 13 00:41:43.207741 systemd[1]: Finished dracut-initqueue.service. May 13 00:41:43.209497 systemd[1]: Reached target remote-fs-pre.target. May 13 00:41:43.209815 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:41:43.213513 systemd[1]: Reached target remote-fs.target. May 13 00:41:43.214476 systemd[1]: Starting dracut-pre-mount.service... May 13 00:41:43.220789 systemd[1]: Finished dracut-pre-mount.service. May 13 00:41:43.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.243643 ignition[650]: parsing config with SHA512: b264d527acaedd34fb414aba4850aa43d2e733820d5c136bbebd39cdc8894994abdd0afd502a8ac3721642e05bc9194d9d741d3063321706a8546900d6943803 May 13 00:41:43.250949 unknown[650]: fetched base config from "system" May 13 00:41:43.251350 ignition[650]: fetch-offline: fetch-offline passed May 13 00:41:43.250960 unknown[650]: fetched user config from "qemu" May 13 00:41:43.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.251394 ignition[650]: Ignition finished successfully May 13 00:41:43.252715 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:41:43.254254 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:41:43.254948 systemd[1]: Starting ignition-kargs.service... May 13 00:41:43.256921 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.65/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:41:43.263336 ignition[740]: Ignition 2.14.0 May 13 00:41:43.263346 ignition[740]: Stage: kargs May 13 00:41:43.263430 ignition[740]: no configs at "/usr/lib/ignition/base.d" May 13 00:41:43.263438 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:43.265722 systemd[1]: Finished ignition-kargs.service. May 13 00:41:43.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.264203 ignition[740]: kargs: kargs passed May 13 00:41:43.268060 systemd[1]: Starting ignition-disks.service... May 13 00:41:43.264235 ignition[740]: Ignition finished successfully May 13 00:41:43.274184 ignition[746]: Ignition 2.14.0 May 13 00:41:43.274195 ignition[746]: Stage: disks May 13 00:41:43.274285 ignition[746]: no configs at "/usr/lib/ignition/base.d" May 13 00:41:43.274293 ignition[746]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:43.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.275741 systemd[1]: Finished ignition-disks.service. May 13 00:41:43.275190 ignition[746]: disks: disks passed May 13 00:41:43.277228 systemd[1]: Reached target initrd-root-device.target. May 13 00:41:43.275227 ignition[746]: Ignition finished successfully May 13 00:41:43.279035 systemd[1]: Reached target local-fs-pre.target. May 13 00:41:43.279826 systemd[1]: Reached target local-fs.target. May 13 00:41:43.281304 systemd[1]: Reached target sysinit.target. May 13 00:41:43.282064 systemd[1]: Reached target basic.target. May 13 00:41:43.283949 systemd[1]: Starting systemd-fsck-root.service... May 13 00:41:43.293367 systemd-fsck[754]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:41:43.549350 systemd[1]: Finished systemd-fsck-root.service. May 13 00:41:43.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.550607 systemd[1]: Mounting sysroot.mount... May 13 00:41:43.566884 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:41:43.567267 systemd[1]: Mounted sysroot.mount. May 13 00:41:43.568031 systemd[1]: Reached target initrd-root-fs.target. May 13 00:41:43.570429 systemd[1]: Mounting sysroot-usr.mount... May 13 00:41:43.571477 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:41:43.571512 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:41:43.571536 systemd[1]: Reached target ignition-diskful.target. May 13 00:41:43.573379 systemd[1]: Mounted sysroot-usr.mount. May 13 00:41:43.575213 systemd[1]: Starting initrd-setup-root.service... May 13 00:41:43.579815 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:41:43.582450 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 13 00:41:43.585177 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:41:43.588025 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:41:43.610522 systemd[1]: Finished initrd-setup-root.service. May 13 00:41:43.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.612797 systemd[1]: Starting ignition-mount.service... May 13 00:41:43.614663 systemd[1]: Starting sysroot-boot.service... May 13 00:41:43.617224 bash[805]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:41:43.624047 ignition[806]: INFO : Ignition 2.14.0 May 13 00:41:43.624047 ignition[806]: INFO : Stage: mount May 13 00:41:43.625667 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:41:43.625667 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:43.625667 ignition[806]: INFO : mount: mount passed May 13 00:41:43.625667 ignition[806]: INFO : Ignition finished successfully May 13 00:41:43.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:43.625640 systemd[1]: Finished ignition-mount.service. May 13 00:41:43.634230 systemd[1]: Finished sysroot-boot.service. May 13 00:41:43.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:44.040286 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:41:44.054531 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) May 13 00:41:44.054568 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:41:44.054581 kernel: BTRFS info (device vda6): using free space tree May 13 00:41:44.055332 kernel: BTRFS info (device vda6): has skinny extents May 13 00:41:44.058995 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:41:44.060564 systemd[1]: Starting ignition-files.service... May 13 00:41:44.073281 ignition[835]: INFO : Ignition 2.14.0 May 13 00:41:44.073281 ignition[835]: INFO : Stage: files May 13 00:41:44.076881 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:41:44.076881 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:44.076881 ignition[835]: DEBUG : files: compiled without relabeling support, skipping May 13 00:41:44.076881 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:41:44.076881 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:41:44.084276 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:41:44.084276 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:41:44.084276 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:41:44.084276 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 00:41:44.084276 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 13 00:41:44.077710 unknown[835]: wrote ssh authorized keys file for user: core May 13 00:41:44.176151 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:41:44.229002 systemd-networkd[719]: eth0: Gained IPv6LL May 13 00:41:44.368130 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 00:41:44.368130 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:41:44.372115 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 13 00:41:44.715092 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:41:45.277106 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:41:45.277106 ignition[835]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:41:45.281159 ignition[835]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:41:45.308548 ignition[835]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:41:45.310247 ignition[835]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:41:45.311820 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:41:45.313788 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:41:45.315796 ignition[835]: INFO : files: files passed May 13 00:41:45.316658 ignition[835]: INFO : Ignition finished successfully May 13 00:41:45.318563 systemd[1]: Finished ignition-files.service. May 13 00:41:45.323795 kernel: kauditd_printk_skb: 24 callbacks suppressed May 13 00:41:45.323816 kernel: audit: type=1130 audit(1747096905.317:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.323795 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:41:45.324230 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:41:45.324738 systemd[1]: Starting ignition-quench.service... May 13 00:41:45.335229 kernel: audit: type=1130 audit(1747096905.327:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.335243 kernel: audit: type=1131 audit(1747096905.327:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.326708 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:41:45.326770 systemd[1]: Finished ignition-quench.service. May 13 00:41:45.341345 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:41:45.344575 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:41:45.346704 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:41:45.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.347030 systemd[1]: Reached target ignition-complete.target. May 13 00:41:45.354000 kernel: audit: type=1130 audit(1747096905.346:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.354026 systemd[1]: Starting initrd-parse-etc.service... May 13 00:41:45.367395 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:41:45.367471 systemd[1]: Finished initrd-parse-etc.service. May 13 00:41:45.376278 kernel: audit: type=1130 audit(1747096905.368:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.376301 kernel: audit: type=1131 audit(1747096905.368:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.369399 systemd[1]: Reached target initrd-fs.target. May 13 00:41:45.378336 systemd[1]: Reached target initrd.target. May 13 00:41:45.380239 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:41:45.382373 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:41:45.391638 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:41:45.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.394065 systemd[1]: Starting initrd-cleanup.service... May 13 00:41:45.398359 kernel: audit: type=1130 audit(1747096905.392:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.402792 systemd[1]: Stopped target nss-lookup.target. May 13 00:41:45.404458 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:41:45.406270 systemd[1]: Stopped target timers.target. May 13 00:41:45.407904 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:41:45.408924 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:41:45.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.410632 systemd[1]: Stopped target initrd.target. May 13 00:41:45.415594 kernel: audit: type=1131 audit(1747096905.409:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.415633 systemd[1]: Stopped target basic.target. May 13 00:41:45.417182 systemd[1]: Stopped target ignition-complete.target. May 13 00:41:45.419008 systemd[1]: Stopped target ignition-diskful.target. May 13 00:41:45.420756 systemd[1]: Stopped target initrd-root-device.target. May 13 00:41:45.422588 systemd[1]: Stopped target remote-fs.target. May 13 00:41:45.424222 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:41:45.425931 systemd[1]: Stopped target sysinit.target. May 13 00:41:45.427505 systemd[1]: Stopped target local-fs.target. May 13 00:41:45.429089 systemd[1]: Stopped target local-fs-pre.target. May 13 00:41:45.430767 systemd[1]: Stopped target swap.target. May 13 00:41:45.432246 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:41:45.433256 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:41:45.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.434946 systemd[1]: Stopped target cryptsetup.target. May 13 00:41:45.439997 kernel: audit: type=1131 audit(1747096905.434:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.440020 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:41:45.441000 systemd[1]: Stopped dracut-initqueue.service. May 13 00:41:45.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.442612 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:41:45.447134 kernel: audit: type=1131 audit(1747096905.442:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.442693 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:41:45.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.448894 systemd[1]: Stopped target paths.target. May 13 00:41:45.450395 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:41:45.453915 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:41:45.455746 systemd[1]: Stopped target slices.target. May 13 00:41:45.457261 systemd[1]: Stopped target sockets.target. May 13 00:41:45.458811 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:41:45.459978 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:41:45.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.461971 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:41:45.462055 systemd[1]: Stopped ignition-files.service. May 13 00:41:45.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.465145 systemd[1]: Stopping ignition-mount.service... May 13 00:41:45.466741 systemd[1]: Stopping iscsid.service... May 13 00:41:45.468046 iscsid[726]: iscsid shutting down. May 13 00:41:45.468026 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:41:45.468159 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:41:45.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.472144 systemd[1]: Stopping sysroot-boot.service... May 13 00:41:45.472942 ignition[875]: INFO : Ignition 2.14.0 May 13 00:41:45.472942 ignition[875]: INFO : Stage: umount May 13 00:41:45.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.475689 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:41:45.475689 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:41:45.475689 ignition[875]: INFO : umount: umount passed May 13 00:41:45.475689 ignition[875]: INFO : Ignition finished successfully May 13 00:41:45.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.473578 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:41:45.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.473776 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:41:45.474778 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:41:45.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.474907 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:41:45.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.477980 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:41:45.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.478079 systemd[1]: Stopped iscsid.service. May 13 00:41:45.480305 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:41:45.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.480380 systemd[1]: Stopped ignition-mount.service. May 13 00:41:45.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.481459 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:41:45.481530 systemd[1]: Closed iscsid.socket. May 13 00:41:45.482929 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:41:45.482970 systemd[1]: Stopped ignition-disks.service. May 13 00:41:45.484322 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:41:45.484363 systemd[1]: Stopped ignition-kargs.service. May 13 00:41:45.486178 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:41:45.486220 systemd[1]: Stopped ignition-setup.service. May 13 00:41:45.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.487581 systemd[1]: Stopping iscsiuio.service... May 13 00:41:45.489462 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:41:45.489552 systemd[1]: Finished initrd-cleanup.service. May 13 00:41:45.491233 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:41:45.491323 systemd[1]: Stopped iscsiuio.service. May 13 00:41:45.492147 systemd[1]: Stopped target network.target. May 13 00:41:45.493282 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:41:45.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.493318 systemd[1]: Closed iscsiuio.socket. May 13 00:41:45.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.494885 systemd[1]: Stopping systemd-networkd.service... May 13 00:41:45.496154 systemd[1]: Stopping systemd-resolved.service... May 13 00:41:45.500078 systemd-networkd[719]: eth0: DHCPv6 lease lost May 13 00:41:45.514000 audit: BPF prog-id=9 op=UNLOAD May 13 00:41:45.501800 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:41:45.501887 systemd[1]: Stopped systemd-networkd.service. May 13 00:41:45.504035 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:41:45.504072 systemd[1]: Closed systemd-networkd.socket. May 13 00:41:45.505089 systemd[1]: Stopping network-cleanup.service... May 13 00:41:45.506613 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:41:45.506648 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:41:45.508211 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:41:45.508254 systemd[1]: Stopped systemd-sysctl.service. May 13 00:41:45.510668 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:41:45.510699 systemd[1]: Stopped systemd-modules-load.service. May 13 00:41:45.512948 systemd[1]: Stopping systemd-udevd.service... May 13 00:41:45.517012 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:41:45.532694 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:41:45.534093 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:41:45.535103 systemd[1]: Stopped systemd-resolved.service. May 13 00:41:45.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.537349 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:41:45.538356 systemd[1]: Stopped systemd-udevd.service. May 13 00:41:45.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.540887 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:41:45.540944 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:41:45.541000 audit: BPF prog-id=6 op=UNLOAD May 13 00:41:45.543949 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:41:45.543990 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:41:45.546921 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:41:45.548008 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:41:45.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.549824 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:41:45.550772 systemd[1]: Stopped dracut-cmdline.service. May 13 00:41:45.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.552459 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:41:45.553446 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:41:45.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.555731 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:41:45.557668 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:41:45.557709 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:41:45.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.560743 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:41:45.563974 systemd[1]: Stopped network-cleanup.service. May 13 00:41:45.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.565646 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:41:45.566725 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:41:45.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.628458 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:41:45.628546 systemd[1]: Stopped sysroot-boot.service. May 13 00:41:45.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.630272 systemd[1]: Reached target initrd-switch-root.target. May 13 00:41:45.631633 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:41:45.631667 systemd[1]: Stopped initrd-setup-root.service. May 13 00:41:45.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:45.635647 systemd[1]: Starting initrd-switch-root.service... May 13 00:41:45.651467 systemd[1]: Switching root. May 13 00:41:45.672469 systemd-journald[198]: Journal stopped May 13 00:41:48.226216 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 13 00:41:48.226271 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:41:48.226284 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:41:48.226293 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:41:48.226303 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:41:48.226312 kernel: SELinux: policy capability open_perms=1 May 13 00:41:48.226322 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:41:48.226334 kernel: SELinux: policy capability always_check_network=0 May 13 00:41:48.226348 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:41:48.226357 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:41:48.226366 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:41:48.226376 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:41:48.226385 systemd[1]: Successfully loaded SELinux policy in 40.392ms. May 13 00:41:48.226405 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.527ms. May 13 00:41:48.226417 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:41:48.226427 systemd[1]: Detected virtualization kvm. May 13 00:41:48.226438 systemd[1]: Detected architecture x86-64. May 13 00:41:48.226448 systemd[1]: Detected first boot. May 13 00:41:48.226459 systemd[1]: Initializing machine ID from VM UUID. May 13 00:41:48.226469 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:41:48.226483 systemd[1]: Populated /etc with preset unit settings. May 13 00:41:48.226493 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:41:48.226508 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:41:48.226522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:41:48.226537 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:41:48.226548 systemd[1]: Stopped initrd-switch-root.service. May 13 00:41:48.226559 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:41:48.226570 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:41:48.226583 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:41:48.226593 systemd[1]: Created slice system-getty.slice. May 13 00:41:48.226603 systemd[1]: Created slice system-modprobe.slice. May 13 00:41:48.226613 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:41:48.226623 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:41:48.226634 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:41:48.226648 systemd[1]: Created slice user.slice. May 13 00:41:48.226658 systemd[1]: Started systemd-ask-password-console.path. May 13 00:41:48.226669 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:41:48.226680 systemd[1]: Set up automount boot.automount. May 13 00:41:48.226691 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:41:48.226701 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:41:48.226711 systemd[1]: Stopped target initrd-fs.target. May 13 00:41:48.226721 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:41:48.226731 systemd[1]: Reached target integritysetup.target. May 13 00:41:48.226741 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:41:48.226752 systemd[1]: Reached target remote-fs.target. May 13 00:41:48.226764 systemd[1]: Reached target slices.target. May 13 00:41:48.226774 systemd[1]: Reached target swap.target. May 13 00:41:48.226792 systemd[1]: Reached target torcx.target. May 13 00:41:48.226803 systemd[1]: Reached target veritysetup.target. May 13 00:41:48.226812 systemd[1]: Listening on systemd-coredump.socket. May 13 00:41:48.226822 systemd[1]: Listening on systemd-initctl.socket. May 13 00:41:48.226832 systemd[1]: Listening on systemd-networkd.socket. May 13 00:41:48.226843 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:41:48.226863 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:41:48.226874 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:41:48.226885 systemd[1]: Mounting dev-hugepages.mount... May 13 00:41:48.226895 systemd[1]: Mounting dev-mqueue.mount... May 13 00:41:48.226905 systemd[1]: Mounting media.mount... May 13 00:41:48.226915 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:48.226925 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:41:48.226936 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:41:48.226945 systemd[1]: Mounting tmp.mount... May 13 00:41:48.226956 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:41:48.226966 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:41:48.226978 systemd[1]: Starting kmod-static-nodes.service... May 13 00:41:48.226989 systemd[1]: Starting modprobe@configfs.service... May 13 00:41:48.226998 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:41:48.227009 systemd[1]: Starting modprobe@drm.service... May 13 00:41:48.227019 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:41:48.227029 systemd[1]: Starting modprobe@fuse.service... May 13 00:41:48.227039 systemd[1]: Starting modprobe@loop.service... May 13 00:41:48.227050 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:41:48.227061 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:41:48.227071 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:41:48.227081 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:41:48.227091 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:41:48.227101 systemd[1]: Stopped systemd-journald.service. May 13 00:41:48.227111 kernel: fuse: init (API version 7.34) May 13 00:41:48.227120 kernel: loop: module loaded May 13 00:41:48.227129 systemd[1]: Starting systemd-journald.service... May 13 00:41:48.227139 systemd[1]: Starting systemd-modules-load.service... May 13 00:41:48.227149 systemd[1]: Starting systemd-network-generator.service... May 13 00:41:48.227161 systemd[1]: Starting systemd-remount-fs.service... May 13 00:41:48.227172 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:41:48.227182 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:41:48.227192 systemd[1]: Stopped verity-setup.service. May 13 00:41:48.227202 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:48.227214 systemd-journald[985]: Journal started May 13 00:41:48.227249 systemd-journald[985]: Runtime Journal (/run/log/journal/1f694a9a3c1f4d1498f7e9036b215f1a) is 6.0M, max 48.4M, 42.4M free. May 13 00:41:45.731000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:41:45.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:41:45.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:41:45.943000 audit: BPF prog-id=10 op=LOAD May 13 00:41:45.943000 audit: BPF prog-id=10 op=UNLOAD May 13 00:41:45.943000 audit: BPF prog-id=11 op=LOAD May 13 00:41:45.943000 audit: BPF prog-id=11 op=UNLOAD May 13 00:41:45.977000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:41:45.977000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:45.977000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:41:45.979000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:41:45.979000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9a9 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:45.979000 audit: CWD cwd="/" May 13 00:41:45.979000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:45.979000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:45.979000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:41:48.049000 audit: BPF prog-id=12 op=LOAD May 13 00:41:48.049000 audit: BPF prog-id=3 op=UNLOAD May 13 00:41:48.049000 audit: BPF prog-id=13 op=LOAD May 13 00:41:48.049000 audit: BPF prog-id=14 op=LOAD May 13 00:41:48.049000 audit: BPF prog-id=4 op=UNLOAD May 13 00:41:48.049000 audit: BPF prog-id=5 op=UNLOAD May 13 00:41:48.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.089000 audit: BPF prog-id=12 op=UNLOAD May 13 00:41:48.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.207000 audit: BPF prog-id=15 op=LOAD May 13 00:41:48.207000 audit: BPF prog-id=16 op=LOAD May 13 00:41:48.207000 audit: BPF prog-id=17 op=LOAD May 13 00:41:48.207000 audit: BPF prog-id=13 op=UNLOAD May 13 00:41:48.207000 audit: BPF prog-id=14 op=UNLOAD May 13 00:41:48.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.223000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:41:48.223000 audit[985]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe668f2470 a2=4000 a3=7ffe668f250c items=0 ppid=1 pid=985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:48.223000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:41:48.048281 systemd[1]: Queued start job for default target multi-user.target. May 13 00:41:45.975966 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:41:48.048292 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:41:45.976220 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:41:48.050981 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:41:45.976240 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:41:45.976273 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:41:45.976285 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:41:45.976319 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:41:45.976335 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:41:48.228875 systemd[1]: Mounted dev-hugepages.mount. May 13 00:41:48.228895 systemd[1]: Started systemd-journald.service. May 13 00:41:45.976556 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:41:45.976593 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:41:45.976607 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:41:45.977404 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:41:45.977445 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:41:45.977467 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:41:45.977484 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:41:45.977503 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:41:45.977519 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:41:47.770238 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:41:47.770482 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:41:47.770571 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:41:47.770718 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:41:47.770762 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:41:47.770821 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:41:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:41:48.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.230826 systemd[1]: Mounted dev-mqueue.mount. May 13 00:41:48.231626 systemd[1]: Mounted media.mount. May 13 00:41:48.232373 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:41:48.233235 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:41:48.234117 systemd[1]: Mounted tmp.mount. May 13 00:41:48.235102 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:41:48.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.236213 systemd[1]: Finished kmod-static-nodes.service. May 13 00:41:48.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.237222 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:41:48.237391 systemd[1]: Finished modprobe@configfs.service. May 13 00:41:48.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.238411 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:41:48.238536 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:41:48.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.239526 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:41:48.239671 systemd[1]: Finished modprobe@drm.service. May 13 00:41:48.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.240630 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:41:48.240787 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:41:48.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.241816 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:41:48.241944 systemd[1]: Finished modprobe@fuse.service. May 13 00:41:48.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.242923 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:41:48.243093 systemd[1]: Finished modprobe@loop.service. May 13 00:41:48.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.244160 systemd[1]: Finished systemd-modules-load.service. May 13 00:41:48.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.245291 systemd[1]: Finished systemd-network-generator.service. May 13 00:41:48.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.246432 systemd[1]: Finished systemd-remount-fs.service. May 13 00:41:48.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.247581 systemd[1]: Reached target network-pre.target. May 13 00:41:48.249350 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:41:48.251052 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:41:48.251784 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:41:48.252903 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:41:48.254556 systemd[1]: Starting systemd-journal-flush.service... May 13 00:41:48.255535 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:41:48.256246 systemd[1]: Starting systemd-random-seed.service... May 13 00:41:48.257354 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:41:48.258180 systemd[1]: Starting systemd-sysctl.service... May 13 00:41:48.259803 systemd[1]: Starting systemd-sysusers.service... May 13 00:41:48.262240 systemd-journald[985]: Time spent on flushing to /var/log/journal/1f694a9a3c1f4d1498f7e9036b215f1a is 13.308ms for 1155 entries. May 13 00:41:48.262240 systemd-journald[985]: System Journal (/var/log/journal/1f694a9a3c1f4d1498f7e9036b215f1a) is 8.0M, max 195.6M, 187.6M free. May 13 00:41:48.906867 systemd-journald[985]: Received client request to flush runtime journal. May 13 00:41:48.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.263351 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:41:48.907575 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:41:48.327432 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:41:48.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:48.328418 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:41:48.330083 systemd[1]: Starting systemd-udev-settle.service... May 13 00:41:48.369177 systemd[1]: Finished systemd-sysctl.service. May 13 00:41:48.373296 systemd[1]: Finished systemd-sysusers.service. May 13 00:41:48.542115 systemd[1]: Finished systemd-random-seed.service. May 13 00:41:48.543128 systemd[1]: Reached target first-boot-complete.target. May 13 00:41:48.907882 systemd[1]: Finished systemd-journal-flush.service. May 13 00:41:49.237925 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:41:49.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.238000 audit: BPF prog-id=18 op=LOAD May 13 00:41:49.238000 audit: BPF prog-id=19 op=LOAD May 13 00:41:49.238000 audit: BPF prog-id=7 op=UNLOAD May 13 00:41:49.239000 audit: BPF prog-id=8 op=UNLOAD May 13 00:41:49.240550 systemd[1]: Starting systemd-udevd.service... May 13 00:41:49.254873 systemd-udevd[1014]: Using default interface naming scheme 'v252'. May 13 00:41:49.266024 systemd[1]: Started systemd-udevd.service. May 13 00:41:49.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.267000 audit: BPF prog-id=20 op=LOAD May 13 00:41:49.268718 systemd[1]: Starting systemd-networkd.service... May 13 00:41:49.273477 systemd[1]: Starting systemd-userdbd.service... May 13 00:41:49.272000 audit: BPF prog-id=21 op=LOAD May 13 00:41:49.272000 audit: BPF prog-id=22 op=LOAD May 13 00:41:49.272000 audit: BPF prog-id=23 op=LOAD May 13 00:41:49.300702 systemd[1]: Started systemd-userdbd.service. May 13 00:41:49.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.309417 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:41:49.315173 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:41:49.333885 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:41:49.339879 kernel: ACPI: button: Power Button [PWRF] May 13 00:41:49.345285 systemd-networkd[1021]: lo: Link UP May 13 00:41:49.345295 systemd-networkd[1021]: lo: Gained carrier May 13 00:41:49.345635 systemd-networkd[1021]: Enumeration completed May 13 00:41:49.345730 systemd[1]: Started systemd-networkd.service. May 13 00:41:49.375446 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:41:49.376521 systemd-networkd[1021]: eth0: Link UP May 13 00:41:49.376529 systemd-networkd[1021]: eth0: Gained carrier May 13 00:41:49.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.380000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:41:49.380000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ab38837ee0 a1=338ac a2=7fa086e46bc5 a3=5 items=110 ppid=1014 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:49.380000 audit: CWD cwd="/" May 13 00:41:49.380000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=1 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=2 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=3 name=(null) inode=15482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=4 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=5 name=(null) inode=15483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=6 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=7 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=8 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=9 name=(null) inode=15485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=10 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=11 name=(null) inode=15486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=12 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=13 name=(null) inode=15487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=14 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=15 name=(null) inode=15488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=16 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=17 name=(null) inode=15489 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=18 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=19 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=20 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=21 name=(null) inode=15491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=22 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=23 name=(null) inode=15492 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=24 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=25 name=(null) inode=15493 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=26 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=27 name=(null) inode=15494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=28 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=29 name=(null) inode=15495 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=30 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=31 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=32 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=33 name=(null) inode=15497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=34 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=35 name=(null) inode=15498 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=36 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=37 name=(null) inode=15499 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=38 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=39 name=(null) inode=15500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=40 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=41 name=(null) inode=15501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=42 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=43 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=44 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=45 name=(null) inode=15503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=46 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=47 name=(null) inode=15504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=48 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=49 name=(null) inode=15505 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=50 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=51 name=(null) inode=15506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=52 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=53 name=(null) inode=15507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=55 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=56 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=57 name=(null) inode=15509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=58 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=59 name=(null) inode=15510 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=60 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=61 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=62 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=63 name=(null) inode=15512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=64 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=65 name=(null) inode=15513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=66 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=67 name=(null) inode=15514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=68 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=69 name=(null) inode=15515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=70 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=71 name=(null) inode=15516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=72 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=73 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=74 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=75 name=(null) inode=15518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=76 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=77 name=(null) inode=15519 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=78 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=79 name=(null) inode=15520 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=80 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=81 name=(null) inode=15521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=82 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=83 name=(null) inode=15522 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=84 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=85 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=86 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=87 name=(null) inode=15524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=88 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=89 name=(null) inode=15525 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=90 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=91 name=(null) inode=15526 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=92 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=93 name=(null) inode=15527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=94 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=95 name=(null) inode=15528 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=96 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=97 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=98 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=99 name=(null) inode=15530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=100 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=101 name=(null) inode=15531 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=102 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=103 name=(null) inode=15532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=104 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=105 name=(null) inode=15533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=106 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=107 name=(null) inode=15534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PATH item=109 name=(null) inode=15535 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:49.380000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:41:49.388041 systemd-networkd[1021]: eth0: DHCPv4 address 10.0.0.65/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:41:49.405299 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 13 00:41:49.407957 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:41:49.408090 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:41:49.408222 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:41:49.425889 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:41:49.431874 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:41:49.489706 kernel: kvm: Nested Virtualization enabled May 13 00:41:49.489813 kernel: SVM: kvm: Nested Paging enabled May 13 00:41:49.489828 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:41:49.489873 kernel: SVM: Virtual GIF supported May 13 00:41:49.504885 kernel: EDAC MC: Ver: 3.0.0 May 13 00:41:49.531187 systemd[1]: Finished systemd-udev-settle.service. May 13 00:41:49.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.533007 systemd[1]: Starting lvm2-activation-early.service... May 13 00:41:49.540015 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:41:49.566384 systemd[1]: Finished lvm2-activation-early.service. May 13 00:41:49.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.567342 systemd[1]: Reached target cryptsetup.target. May 13 00:41:49.568937 systemd[1]: Starting lvm2-activation.service... May 13 00:41:49.572607 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:41:49.596426 systemd[1]: Finished lvm2-activation.service. May 13 00:41:49.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.597399 systemd[1]: Reached target local-fs-pre.target. May 13 00:41:49.598323 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:41:49.598348 systemd[1]: Reached target local-fs.target. May 13 00:41:49.599236 systemd[1]: Reached target machines.target. May 13 00:41:49.600998 systemd[1]: Starting ldconfig.service... May 13 00:41:49.602107 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:41:49.602151 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:49.603153 systemd[1]: Starting systemd-boot-update.service... May 13 00:41:49.605041 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:41:49.607235 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:41:49.609386 systemd[1]: Starting systemd-sysext.service... May 13 00:41:49.610546 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) May 13 00:41:49.611437 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:41:49.619165 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:41:49.621989 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:41:49.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.641462 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:41:49.641638 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:41:49.651923 kernel: loop0: detected capacity change from 0 to 218376 May 13 00:41:49.673327 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) May 13 00:41:49.673327 systemd-fsck[1062]: /dev/vda1: 791 files, 120712/258078 clusters May 13 00:41:49.675086 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:41:49.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:49.678017 systemd[1]: Mounting boot.mount... May 13 00:41:49.713351 systemd[1]: Mounted boot.mount. May 13 00:41:50.540384 systemd[1]: Finished systemd-boot-update.service. May 13 00:41:50.543887 kernel: kauditd_printk_skb: 224 callbacks suppressed May 13 00:41:50.543945 kernel: audit: type=1130 audit(1747096910.540:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.545867 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:41:50.562884 kernel: loop1: detected capacity change from 0 to 218376 May 13 00:41:50.567231 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:41:50.569958 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 13 00:41:50.570248 (sd-sysext)[1066]: Merged extensions into '/usr'. May 13 00:41:50.574153 systemd[1]: Finished ldconfig.service. May 13 00:41:50.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.578871 kernel: audit: type=1130 audit(1747096910.574:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.585120 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:41:50.585761 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:41:50.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.586966 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.588165 systemd[1]: Mounting usr-share-oem.mount... May 13 00:41:50.590869 kernel: audit: type=1130 audit(1747096910.585:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.590877 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:41:50.591913 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:41:50.593525 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:41:50.595308 systemd[1]: Starting modprobe@loop.service... May 13 00:41:50.596125 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:41:50.596231 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:50.596328 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.598583 systemd[1]: Mounted usr-share-oem.mount. May 13 00:41:50.599692 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:41:50.599804 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:41:50.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.600978 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:41:50.601072 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:41:50.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.604878 kernel: audit: type=1130 audit(1747096910.600:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.604910 kernel: audit: type=1131 audit(1747096910.600:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.608159 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:41:50.608253 systemd[1]: Finished modprobe@loop.service. May 13 00:41:50.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.611874 kernel: audit: type=1130 audit(1747096910.607:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.611902 kernel: audit: type=1131 audit(1747096910.607:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.615388 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:41:50.615476 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:41:50.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.618534 systemd[1]: Finished systemd-sysext.service. May 13 00:41:50.621184 kernel: audit: type=1130 audit(1747096910.614:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.621230 kernel: audit: type=1131 audit(1747096910.614:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.623172 systemd[1]: Starting ensure-sysext.service... May 13 00:41:50.625875 kernel: audit: type=1130 audit(1747096910.622:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.626661 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:41:50.629248 systemd[1]: Reloading. May 13 00:41:50.636343 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:41:50.638206 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:41:50.640579 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:41:50.678633 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-05-13T00:41:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:41:50.678990 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-05-13T00:41:50Z" level=info msg="torcx already run" May 13 00:41:50.740251 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:41:50.740269 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:41:50.756666 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:41:50.807000 audit: BPF prog-id=24 op=LOAD May 13 00:41:50.808000 audit: BPF prog-id=25 op=LOAD May 13 00:41:50.808000 audit: BPF prog-id=18 op=UNLOAD May 13 00:41:50.808000 audit: BPF prog-id=19 op=UNLOAD May 13 00:41:50.808000 audit: BPF prog-id=26 op=LOAD May 13 00:41:50.808000 audit: BPF prog-id=15 op=UNLOAD May 13 00:41:50.808000 audit: BPF prog-id=27 op=LOAD May 13 00:41:50.808000 audit: BPF prog-id=28 op=LOAD May 13 00:41:50.808000 audit: BPF prog-id=16 op=UNLOAD May 13 00:41:50.808000 audit: BPF prog-id=17 op=UNLOAD May 13 00:41:50.810000 audit: BPF prog-id=29 op=LOAD May 13 00:41:50.810000 audit: BPF prog-id=21 op=UNLOAD May 13 00:41:50.810000 audit: BPF prog-id=30 op=LOAD May 13 00:41:50.810000 audit: BPF prog-id=31 op=LOAD May 13 00:41:50.810000 audit: BPF prog-id=22 op=UNLOAD May 13 00:41:50.810000 audit: BPF prog-id=23 op=UNLOAD May 13 00:41:50.811000 audit: BPF prog-id=32 op=LOAD May 13 00:41:50.811000 audit: BPF prog-id=20 op=UNLOAD May 13 00:41:50.815868 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:41:50.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.819144 systemd[1]: Starting audit-rules.service... May 13 00:41:50.821174 systemd[1]: Starting clean-ca-certificates.service... May 13 00:41:50.823110 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:41:50.824000 audit: BPF prog-id=33 op=LOAD May 13 00:41:50.826048 systemd[1]: Starting systemd-resolved.service... May 13 00:41:50.826000 audit: BPF prog-id=34 op=LOAD May 13 00:41:50.828404 systemd[1]: Starting systemd-timesyncd.service... May 13 00:41:50.830333 systemd[1]: Starting systemd-update-utmp.service... May 13 00:41:50.831708 systemd[1]: Finished clean-ca-certificates.service. May 13 00:41:50.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.835000 audit[1148]: SYSTEM_BOOT pid=1148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:41:50.839078 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.839494 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:41:50.841082 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:41:50.843241 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:41:50.845462 systemd[1]: Starting modprobe@loop.service... May 13 00:41:50.846291 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:41:50.846598 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:50.846848 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:41:50.847061 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.849207 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:41:50.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.850841 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:41:50.850988 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:41:50.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.852294 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:41:50.852394 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:41:50.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:50.852000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:41:50.852000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc20627f90 a2=420 a3=0 items=0 ppid=1137 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:50.852000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:41:50.853794 augenrules[1160]: No rules May 13 00:41:50.853739 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:41:50.853826 systemd[1]: Finished modprobe@loop.service. May 13 00:41:50.855075 systemd[1]: Finished audit-rules.service. May 13 00:41:50.857500 systemd[1]: Finished systemd-update-utmp.service. May 13 00:41:50.859196 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.859371 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:41:50.860448 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:41:50.862067 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:41:50.863760 systemd[1]: Starting modprobe@loop.service... May 13 00:41:50.864690 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:41:50.864811 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:50.865912 systemd[1]: Starting systemd-update-done.service... May 13 00:41:50.866729 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:41:50.866823 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.867688 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:41:50.867802 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:41:50.868960 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:41:50.869066 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:41:50.872219 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:41:50.872316 systemd[1]: Finished modprobe@loop.service. May 13 00:41:50.873431 systemd[1]: Finished systemd-update-done.service. May 13 00:41:50.874566 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:41:50.874653 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:41:50.876819 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.877055 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:41:50.878000 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:41:50.879683 systemd[1]: Starting modprobe@drm.service... May 13 00:41:50.881344 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:41:50.883287 systemd[1]: Starting modprobe@loop.service... May 13 00:41:50.884114 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:41:50.884257 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:50.885528 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:41:50.886502 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:41:50.886591 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:41:50.887616 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:41:50.887725 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:41:50.888831 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:41:50.888937 systemd[1]: Finished modprobe@drm.service. May 13 00:41:50.890078 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:41:50.890172 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:41:50.891364 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:41:50.891453 systemd[1]: Finished modprobe@loop.service. May 13 00:41:50.927849 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:41:50.927951 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:41:50.929559 systemd[1]: Finished ensure-sysext.service. May 13 00:41:50.933416 systemd[1]: Started systemd-timesyncd.service. May 13 00:41:50.934370 systemd[1]: Reached target time-set.target. May 13 00:41:51.937544 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:41:51.937585 systemd-timesyncd[1147]: Initial clock synchronization to Tue 2025-05-13 00:41:51.937487 UTC. May 13 00:41:51.937862 systemd-resolved[1143]: Positive Trust Anchors: May 13 00:41:51.937877 systemd-resolved[1143]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:41:51.937904 systemd-resolved[1143]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:41:51.944481 systemd-resolved[1143]: Defaulting to hostname 'linux'. May 13 00:41:51.945710 systemd[1]: Started systemd-resolved.service. May 13 00:41:51.946584 systemd[1]: Reached target network.target. May 13 00:41:51.947374 systemd[1]: Reached target nss-lookup.target. May 13 00:41:51.948175 systemd[1]: Reached target sysinit.target. May 13 00:41:51.949022 systemd[1]: Started motdgen.path. May 13 00:41:51.949735 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:41:51.950923 systemd[1]: Started logrotate.timer. May 13 00:41:51.952197 systemd[1]: Started mdadm.timer. May 13 00:41:51.952869 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:41:51.953708 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:41:51.953732 systemd[1]: Reached target paths.target. May 13 00:41:51.954579 systemd[1]: Reached target timers.target. May 13 00:41:51.955571 systemd[1]: Listening on dbus.socket. May 13 00:41:51.957292 systemd[1]: Starting docker.socket... May 13 00:41:51.959998 systemd[1]: Listening on sshd.socket. May 13 00:41:51.960925 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:51.961248 systemd[1]: Listening on docker.socket. May 13 00:41:51.962075 systemd[1]: Reached target sockets.target. May 13 00:41:51.962910 systemd[1]: Reached target basic.target. May 13 00:41:51.963926 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:41:51.963948 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:41:51.964764 systemd[1]: Starting containerd.service... May 13 00:41:51.966344 systemd[1]: Starting dbus.service... May 13 00:41:51.967768 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:41:51.969401 systemd[1]: Starting extend-filesystems.service... May 13 00:41:51.972309 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:41:51.973436 jq[1179]: false May 13 00:41:51.973226 systemd[1]: Starting motdgen.service... May 13 00:41:51.974827 systemd[1]: Starting prepare-helm.service... May 13 00:41:51.977104 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:41:51.979263 systemd[1]: Starting sshd-keygen.service... May 13 00:41:51.982053 systemd[1]: Starting systemd-logind.service... May 13 00:41:51.982488 extend-filesystems[1180]: Found loop1 May 13 00:41:51.982488 extend-filesystems[1180]: Found sr0 May 13 00:41:51.982488 extend-filesystems[1180]: Found vda May 13 00:41:51.982488 extend-filesystems[1180]: Found vda1 May 13 00:41:51.982488 extend-filesystems[1180]: Found vda2 May 13 00:41:51.982488 extend-filesystems[1180]: Found vda3 May 13 00:41:51.982488 extend-filesystems[1180]: Found usr May 13 00:41:51.983022 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:41:52.001607 extend-filesystems[1180]: Found vda4 May 13 00:41:52.001607 extend-filesystems[1180]: Found vda6 May 13 00:41:52.001607 extend-filesystems[1180]: Found vda7 May 13 00:41:52.001607 extend-filesystems[1180]: Found vda9 May 13 00:41:52.001607 extend-filesystems[1180]: Checking size of /dev/vda9 May 13 00:41:51.983072 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:41:51.983381 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:41:52.018460 jq[1194]: true May 13 00:41:51.984126 systemd[1]: Starting update-engine.service... May 13 00:41:51.986669 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:41:51.988451 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:41:52.018791 jq[1198]: true May 13 00:41:51.988628 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:41:51.989461 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:41:51.989603 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:41:52.007096 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:41:52.007246 systemd[1]: Finished motdgen.service. May 13 00:41:52.024243 extend-filesystems[1180]: Resized partition /dev/vda9 May 13 00:41:52.025785 tar[1196]: linux-amd64/LICENSE May 13 00:41:52.025785 tar[1196]: linux-amd64/helm May 13 00:41:52.025968 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:41:52.029466 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:41:52.030526 dbus-daemon[1178]: [system] SELinux support is enabled May 13 00:41:52.030786 systemd[1]: Started dbus.service. May 13 00:41:52.033124 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:41:52.033142 systemd[1]: Reached target system-config.target. May 13 00:41:52.034043 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:41:52.034055 systemd[1]: Reached target user-config.target. May 13 00:41:52.039608 update_engine[1191]: I0513 00:41:52.039300 1191 main.cc:92] Flatcar Update Engine starting May 13 00:41:52.039983 systemd-logind[1189]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:41:52.040171 systemd-logind[1189]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:41:52.041234 systemd-logind[1189]: New seat seat0. May 13 00:41:52.041740 systemd[1]: Started update-engine.service. May 13 00:41:52.047497 systemd[1]: Started locksmithd.service. May 13 00:41:52.051756 update_engine[1191]: I0513 00:41:52.041819 1191 update_check_scheduler.cc:74] Next update check in 11m29s May 13 00:41:52.048856 systemd[1]: Started systemd-logind.service. May 13 00:41:52.051944 env[1200]: time="2025-05-13T00:41:52.051904212Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:41:52.061459 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:41:52.085472 env[1200]: time="2025-05-13T00:41:52.075751212Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:41:52.085594 env[1200]: time="2025-05-13T00:41:52.085524414Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086681885Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086707393Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086882992Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086900725Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086912267Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086921444Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.086983631Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.087159952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.087265780Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:41:52.088398 env[1200]: time="2025-05-13T00:41:52.087278614Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:41:52.088228 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:41:52.088780 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:41:52.088780 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:41:52.088780 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:41:52.094879 env[1200]: time="2025-05-13T00:41:52.087318419Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:41:52.094879 env[1200]: time="2025-05-13T00:41:52.087328868Z" level=info msg="metadata content store policy set" policy=shared May 13 00:41:52.088377 systemd[1]: Finished extend-filesystems.service. May 13 00:41:52.094994 extend-filesystems[1180]: Resized filesystem in /dev/vda9 May 13 00:41:52.099537 bash[1225]: Updated "/home/core/.ssh/authorized_keys" May 13 00:41:52.100442 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:41:52.103648 env[1200]: time="2025-05-13T00:41:52.103619635Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:41:52.103703 env[1200]: time="2025-05-13T00:41:52.103651695Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:41:52.103703 env[1200]: time="2025-05-13T00:41:52.103664359Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:41:52.103703 env[1200]: time="2025-05-13T00:41:52.103689506Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103703 env[1200]: time="2025-05-13T00:41:52.103701749Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103715014Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103726556Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103739049Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103751022Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103763255Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103774526Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:41:52.103801 env[1200]: time="2025-05-13T00:41:52.103785406Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:41:52.103929 env[1200]: time="2025-05-13T00:41:52.103858073Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:41:52.103929 env[1200]: time="2025-05-13T00:41:52.103918676Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:41:52.104141 env[1200]: time="2025-05-13T00:41:52.104117880Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:41:52.104183 env[1200]: time="2025-05-13T00:41:52.104146564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104183 env[1200]: time="2025-05-13T00:41:52.104158466Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:41:52.104230 env[1200]: time="2025-05-13T00:41:52.104199232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104230 env[1200]: time="2025-05-13T00:41:52.104212036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104230 env[1200]: time="2025-05-13T00:41:52.104223819Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104297 env[1200]: time="2025-05-13T00:41:52.104234619Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104297 env[1200]: time="2025-05-13T00:41:52.104246611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104297 env[1200]: time="2025-05-13T00:41:52.104267030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104297 env[1200]: time="2025-05-13T00:41:52.104277840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104297 env[1200]: time="2025-05-13T00:41:52.104288430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104395 env[1200]: time="2025-05-13T00:41:52.104301615Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:41:52.104432 env[1200]: time="2025-05-13T00:41:52.104393998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104432 env[1200]: time="2025-05-13T00:41:52.104410429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104474 env[1200]: time="2025-05-13T00:41:52.104438792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104474 env[1200]: time="2025-05-13T00:41:52.104449261Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:41:52.104474 env[1200]: time="2025-05-13T00:41:52.104461314Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:41:52.104474 env[1200]: time="2025-05-13T00:41:52.104470632Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:41:52.104554 env[1200]: time="2025-05-13T00:41:52.104489537Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:41:52.104554 env[1200]: time="2025-05-13T00:41:52.104521337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:41:52.104767 env[1200]: time="2025-05-13T00:41:52.104710201Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:41:52.104767 env[1200]: time="2025-05-13T00:41:52.104766647Z" level=info msg="Connect containerd service" May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.104793517Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.105219306Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.105469756Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.105506234Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.105540538Z" level=info msg="containerd successfully booted in 0.062809s" May 13 00:41:52.106921 env[1200]: time="2025-05-13T00:41:52.106144722Z" level=info msg="Start subscribing containerd event" May 13 00:41:52.105585 systemd[1]: Started containerd.service. May 13 00:41:52.107436 env[1200]: time="2025-05-13T00:41:52.107397792Z" level=info msg="Start recovering state" May 13 00:41:52.107490 env[1200]: time="2025-05-13T00:41:52.107467613Z" level=info msg="Start event monitor" May 13 00:41:52.107516 env[1200]: time="2025-05-13T00:41:52.107496788Z" level=info msg="Start snapshots syncer" May 13 00:41:52.107516 env[1200]: time="2025-05-13T00:41:52.107505374Z" level=info msg="Start cni network conf syncer for default" May 13 00:41:52.107556 env[1200]: time="2025-05-13T00:41:52.107516635Z" level=info msg="Start streaming server" May 13 00:41:52.115925 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:41:52.335550 systemd-networkd[1021]: eth0: Gained IPv6LL May 13 00:41:52.338189 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:41:52.353121 systemd[1]: Reached target network-online.target. May 13 00:41:52.355809 systemd[1]: Starting kubelet.service... May 13 00:41:52.461909 tar[1196]: linux-amd64/README.md May 13 00:41:52.466088 systemd[1]: Finished prepare-helm.service. May 13 00:41:52.953137 systemd[1]: Started kubelet.service. May 13 00:41:53.364716 kubelet[1247]: E0513 00:41:53.364600 1247 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:41:53.366364 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:41:53.366491 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:41:53.714138 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:41:53.733794 systemd[1]: Finished sshd-keygen.service. May 13 00:41:53.736220 systemd[1]: Starting issuegen.service... May 13 00:41:53.741099 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:41:53.741248 systemd[1]: Finished issuegen.service. May 13 00:41:53.743299 systemd[1]: Starting systemd-user-sessions.service... May 13 00:41:53.749013 systemd[1]: Finished systemd-user-sessions.service. May 13 00:41:53.751384 systemd[1]: Started getty@tty1.service. May 13 00:41:53.753169 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:41:53.754177 systemd[1]: Reached target getty.target. May 13 00:41:53.755012 systemd[1]: Reached target multi-user.target. May 13 00:41:53.758368 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:41:53.763760 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:41:53.763900 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:41:53.764986 systemd[1]: Startup finished in 757ms (kernel) + 4.993s (initrd) + 7.072s (userspace) = 12.823s. May 13 00:41:54.953430 systemd[1]: Created slice system-sshd.slice. May 13 00:41:54.954370 systemd[1]: Started sshd@0-10.0.0.65:22-10.0.0.1:59532.service. May 13 00:41:54.987553 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 59532 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:54.988874 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:54.997100 systemd-logind[1189]: New session 1 of user core. May 13 00:41:54.997967 systemd[1]: Created slice user-500.slice. May 13 00:41:54.998993 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:41:55.007037 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:41:55.008281 systemd[1]: Starting user@500.service... May 13 00:41:55.010788 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.078761 systemd[1272]: Queued start job for default target default.target. May 13 00:41:55.079215 systemd[1272]: Reached target paths.target. May 13 00:41:55.079234 systemd[1272]: Reached target sockets.target. May 13 00:41:55.079247 systemd[1272]: Reached target timers.target. May 13 00:41:55.079257 systemd[1272]: Reached target basic.target. May 13 00:41:55.079289 systemd[1272]: Reached target default.target. May 13 00:41:55.079312 systemd[1272]: Startup finished in 63ms. May 13 00:41:55.079387 systemd[1]: Started user@500.service. May 13 00:41:55.080265 systemd[1]: Started session-1.scope. May 13 00:41:55.131932 systemd[1]: Started sshd@1-10.0.0.65:22-10.0.0.1:59538.service. May 13 00:41:55.164125 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 59538 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.165424 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.168909 systemd-logind[1189]: New session 2 of user core. May 13 00:41:55.169906 systemd[1]: Started session-2.scope. May 13 00:41:55.223356 sshd[1281]: pam_unix(sshd:session): session closed for user core May 13 00:41:55.225752 systemd[1]: sshd@1-10.0.0.65:22-10.0.0.1:59538.service: Deactivated successfully. May 13 00:41:55.226238 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:41:55.226691 systemd-logind[1189]: Session 2 logged out. Waiting for processes to exit. May 13 00:41:55.227477 systemd[1]: Started sshd@2-10.0.0.65:22-10.0.0.1:59546.service. May 13 00:41:55.228162 systemd-logind[1189]: Removed session 2. May 13 00:41:55.257396 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 59546 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.258410 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.263230 systemd-logind[1189]: New session 3 of user core. May 13 00:41:55.264013 systemd[1]: Started session-3.scope. May 13 00:41:55.314027 sshd[1287]: pam_unix(sshd:session): session closed for user core May 13 00:41:55.316552 systemd[1]: sshd@2-10.0.0.65:22-10.0.0.1:59546.service: Deactivated successfully. May 13 00:41:55.317002 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:41:55.317541 systemd-logind[1189]: Session 3 logged out. Waiting for processes to exit. May 13 00:41:55.318498 systemd[1]: Started sshd@3-10.0.0.65:22-10.0.0.1:59556.service. May 13 00:41:55.319264 systemd-logind[1189]: Removed session 3. May 13 00:41:55.353851 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 59556 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.355249 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.358895 systemd-logind[1189]: New session 4 of user core. May 13 00:41:55.359646 systemd[1]: Started session-4.scope. May 13 00:41:55.413829 sshd[1293]: pam_unix(sshd:session): session closed for user core May 13 00:41:55.416254 systemd[1]: sshd@3-10.0.0.65:22-10.0.0.1:59556.service: Deactivated successfully. May 13 00:41:55.416762 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:41:55.417325 systemd-logind[1189]: Session 4 logged out. Waiting for processes to exit. May 13 00:41:55.418215 systemd[1]: Started sshd@4-10.0.0.65:22-10.0.0.1:59568.service. May 13 00:41:55.419125 systemd-logind[1189]: Removed session 4. May 13 00:41:55.450697 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 59568 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.451732 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.455355 systemd-logind[1189]: New session 5 of user core. May 13 00:41:55.456215 systemd[1]: Started session-5.scope. May 13 00:41:55.511895 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:41:55.512141 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:41:55.518632 dbus-daemon[1178]: \xd0\xed9@\xbfU: received setenforce notice (enforcing=1248796176) May 13 00:41:55.520514 sudo[1302]: pam_unix(sudo:session): session closed for user root May 13 00:41:55.522204 sshd[1299]: pam_unix(sshd:session): session closed for user core May 13 00:41:55.524927 systemd[1]: sshd@4-10.0.0.65:22-10.0.0.1:59568.service: Deactivated successfully. May 13 00:41:55.525447 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:41:55.525930 systemd-logind[1189]: Session 5 logged out. Waiting for processes to exit. May 13 00:41:55.526939 systemd[1]: Started sshd@5-10.0.0.65:22-10.0.0.1:59582.service. May 13 00:41:55.527664 systemd-logind[1189]: Removed session 5. May 13 00:41:55.557054 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 59582 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.558110 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.561514 systemd-logind[1189]: New session 6 of user core. May 13 00:41:55.562438 systemd[1]: Started session-6.scope. May 13 00:41:55.613396 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:41:55.613646 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:41:55.615946 sudo[1310]: pam_unix(sudo:session): session closed for user root May 13 00:41:55.620085 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:41:55.620282 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:41:55.629537 systemd[1]: Stopping audit-rules.service... May 13 00:41:55.629000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:41:55.629000 audit[1313]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcba13c450 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:55.629000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:41:55.630881 auditctl[1313]: No rules May 13 00:41:55.631072 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:41:55.631209 systemd[1]: Stopped audit-rules.service. May 13 00:41:55.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:55.632519 systemd[1]: Starting audit-rules.service... May 13 00:41:55.646455 augenrules[1330]: No rules May 13 00:41:55.647053 systemd[1]: Finished audit-rules.service. May 13 00:41:55.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:55.647940 sudo[1309]: pam_unix(sudo:session): session closed for user root May 13 00:41:55.646000 audit[1309]: USER_END pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:41:55.646000 audit[1309]: CRED_DISP pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:41:55.649125 sshd[1306]: pam_unix(sshd:session): session closed for user core May 13 00:41:55.648000 audit[1306]: USER_END pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.648000 audit[1306]: CRED_DISP pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.651987 systemd[1]: sshd@5-10.0.0.65:22-10.0.0.1:59582.service: Deactivated successfully. May 13 00:41:55.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.65:22-10.0.0.1:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:55.652548 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:41:55.653035 systemd-logind[1189]: Session 6 logged out. Waiting for processes to exit. May 13 00:41:55.653931 systemd[1]: Started sshd@6-10.0.0.65:22-10.0.0.1:59598.service. May 13 00:41:55.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.65:22-10.0.0.1:59598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:55.654629 systemd-logind[1189]: Removed session 6. May 13 00:41:55.682000 audit[1336]: USER_ACCT pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.683898 sshd[1336]: Accepted publickey for core from 10.0.0.1 port 59598 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:41:55.683000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.683000 audit[1336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc017b4cf0 a2=3 a3=0 items=0 ppid=1 pid=1336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:55.683000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:55.685073 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:55.687888 systemd-logind[1189]: New session 7 of user core. May 13 00:41:55.688581 systemd[1]: Started session-7.scope. May 13 00:41:55.690000 audit[1336]: USER_START pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.691000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:55.737000 audit[1339]: USER_ACCT pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:41:55.737000 audit[1339]: CRED_REFR pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:41:55.738661 sudo[1339]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:41:55.738834 sudo[1339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:41:55.738000 audit[1339]: USER_START pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:41:55.760296 systemd[1]: Starting docker.service... May 13 00:41:55.802409 env[1351]: time="2025-05-13T00:41:55.801097427Z" level=info msg="Starting up" May 13 00:41:55.802725 env[1351]: time="2025-05-13T00:41:55.802684614Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:41:55.802725 env[1351]: time="2025-05-13T00:41:55.802712075Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:41:55.802801 env[1351]: time="2025-05-13T00:41:55.802737463Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:41:55.802801 env[1351]: time="2025-05-13T00:41:55.802747732Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:41:55.806314 env[1351]: time="2025-05-13T00:41:55.806286470Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:41:55.806314 env[1351]: time="2025-05-13T00:41:55.806304323Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:41:55.806399 env[1351]: time="2025-05-13T00:41:55.806319632Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:41:55.806399 env[1351]: time="2025-05-13T00:41:55.806331875Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:41:55.812005 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport542204153-merged.mount: Deactivated successfully. May 13 00:41:56.539475 env[1351]: time="2025-05-13T00:41:56.539431320Z" level=info msg="Loading containers: start." May 13 00:41:56.596000 audit[1385]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.598855 kernel: kauditd_printk_skb: 52 callbacks suppressed May 13 00:41:56.598894 kernel: audit: type=1325 audit(1747096916.596:203): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.596000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff8dbf2dd0 a2=0 a3=7fff8dbf2dbc items=0 ppid=1351 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.605130 kernel: audit: type=1300 audit(1747096916.596:203): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff8dbf2dd0 a2=0 a3=7fff8dbf2dbc items=0 ppid=1351 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.605175 kernel: audit: type=1327 audit(1747096916.596:203): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:41:56.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:41:56.607054 kernel: audit: type=1325 audit(1747096916.602:204): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.602000 audit[1387]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.602000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffef435c5d0 a2=0 a3=7ffef435c5bc items=0 ppid=1351 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.613826 kernel: audit: type=1300 audit(1747096916.602:204): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffef435c5d0 a2=0 a3=7ffef435c5bc items=0 ppid=1351 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.613871 kernel: audit: type=1327 audit(1747096916.602:204): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:41:56.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:41:56.608000 audit[1389]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.618064 kernel: audit: type=1325 audit(1747096916.608:205): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.618084 kernel: audit: type=1300 audit(1747096916.608:205): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd9fb09ed0 a2=0 a3=7ffd9fb09ebc items=0 ppid=1351 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.608000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd9fb09ed0 a2=0 a3=7ffd9fb09ebc items=0 ppid=1351 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.608000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:41:56.624793 kernel: audit: type=1327 audit(1747096916.608:205): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:41:56.624825 kernel: audit: type=1325 audit(1747096916.609:206): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.609000 audit[1391]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.609000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcce7766e0 a2=0 a3=7ffcce7766cc items=0 ppid=1351 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:41:56.611000 audit[1393]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.611000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe50fb82b0 a2=0 a3=7ffe50fb829c items=0 ppid=1351 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:41:56.639000 audit[1398]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.639000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff07dd3e50 a2=0 a3=7fff07dd3e3c items=0 ppid=1351 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:41:56.820000 audit[1400]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.820000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc4279460 a2=0 a3=7ffcc427944c items=0 ppid=1351 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:41:56.822000 audit[1402]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.822000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc842e8da0 a2=0 a3=7ffc842e8d8c items=0 ppid=1351 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:41:56.823000 audit[1404]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.823000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff0d19ff40 a2=0 a3=7fff0d19ff2c items=0 ppid=1351 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:41:56.846000 audit[1408]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.846000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd11a36f0 a2=0 a3=7ffdd11a36dc items=0 ppid=1351 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.846000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:41:56.851000 audit[1409]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.851000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd6354ffc0 a2=0 a3=7ffd6354ffac items=0 ppid=1351 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:41:56.865433 kernel: Initializing XFRM netlink socket May 13 00:41:56.891050 env[1351]: time="2025-05-13T00:41:56.891000994Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:41:56.904000 audit[1417]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.904000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd8d09d100 a2=0 a3=7ffd8d09d0ec items=0 ppid=1351 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:41:56.915000 audit[1420]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.915000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcb2dc7cf0 a2=0 a3=7ffcb2dc7cdc items=0 ppid=1351 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:41:56.917000 audit[1423]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.917000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffefc08b950 a2=0 a3=7ffefc08b93c items=0 ppid=1351 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:41:56.919000 audit[1425]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.919000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff86d904a0 a2=0 a3=7fff86d9048c items=0 ppid=1351 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:41:56.920000 audit[1427]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.920000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd23c0f540 a2=0 a3=7ffd23c0f52c items=0 ppid=1351 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:41:56.922000 audit[1429]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.922000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffded20bf80 a2=0 a3=7ffded20bf6c items=0 ppid=1351 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:41:56.923000 audit[1431]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.923000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdda947240 a2=0 a3=7ffdda94722c items=0 ppid=1351 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.923000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:41:56.929000 audit[1434]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.929000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff6bd95b40 a2=0 a3=7fff6bd95b2c items=0 ppid=1351 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:41:56.931000 audit[1436]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.931000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd728cbbe0 a2=0 a3=7ffd728cbbcc items=0 ppid=1351 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:41:56.932000 audit[1438]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.932000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd05621810 a2=0 a3=7ffd056217fc items=0 ppid=1351 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:41:56.934000 audit[1440]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.934000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffede2102b0 a2=0 a3=7ffede21029c items=0 ppid=1351 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:41:56.936076 systemd-networkd[1021]: docker0: Link UP May 13 00:41:56.942000 audit[1444]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.942000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcf890530 a2=0 a3=7fffcf89051c items=0 ppid=1351 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:41:56.950000 audit[1445]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:41:56.950000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe09e90120 a2=0 a3=7ffe09e9010c items=0 ppid=1351 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:56.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:41:56.952556 env[1351]: time="2025-05-13T00:41:56.952524294Z" level=info msg="Loading containers: done." May 13 00:41:56.974329 env[1351]: time="2025-05-13T00:41:56.974267959Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:41:56.974521 env[1351]: time="2025-05-13T00:41:56.974458637Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:41:56.974577 env[1351]: time="2025-05-13T00:41:56.974543777Z" level=info msg="Daemon has completed initialization" May 13 00:41:56.991146 systemd[1]: Started docker.service. May 13 00:41:56.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:56.994641 env[1351]: time="2025-05-13T00:41:56.994601269Z" level=info msg="API listen on /run/docker.sock" May 13 00:41:57.722105 env[1200]: time="2025-05-13T00:41:57.722043553Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 13 00:41:59.022741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2232606853.mount: Deactivated successfully. May 13 00:42:00.604007 env[1200]: time="2025-05-13T00:42:00.603946900Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:00.605577 env[1200]: time="2025-05-13T00:42:00.605541661Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:00.607126 env[1200]: time="2025-05-13T00:42:00.607093402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:00.608445 env[1200]: time="2025-05-13T00:42:00.608411624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:00.609152 env[1200]: time="2025-05-13T00:42:00.609117578Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 13 00:42:00.609659 env[1200]: time="2025-05-13T00:42:00.609638155Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 13 00:42:02.610588 env[1200]: time="2025-05-13T00:42:02.610512193Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:02.699527 env[1200]: time="2025-05-13T00:42:02.699479570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:02.709148 env[1200]: time="2025-05-13T00:42:02.709096799Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:02.716772 env[1200]: time="2025-05-13T00:42:02.716730668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:02.717594 env[1200]: time="2025-05-13T00:42:02.717555906Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 13 00:42:02.718067 env[1200]: time="2025-05-13T00:42:02.718033592Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 13 00:42:03.488722 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:42:03.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.488962 systemd[1]: Stopped kubelet.service. May 13 00:42:03.490380 systemd[1]: Starting kubelet.service... May 13 00:42:03.534300 kernel: kauditd_printk_skb: 63 callbacks suppressed May 13 00:42:03.534454 kernel: audit: type=1130 audit(1747096923.487:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.540871 kernel: audit: type=1131 audit(1747096923.487:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.564671 systemd[1]: Started kubelet.service. May 13 00:42:03.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.584446 kernel: audit: type=1130 audit(1747096923.563:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:03.901343 kubelet[1487]: E0513 00:42:03.901205 1487 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:42:03.904162 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:42:03.904281 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:42:03.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:42:03.908432 kernel: audit: type=1131 audit(1747096923.903:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:42:05.240035 env[1200]: time="2025-05-13T00:42:05.239971346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:05.241918 env[1200]: time="2025-05-13T00:42:05.241844410Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:05.243914 env[1200]: time="2025-05-13T00:42:05.243879587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:05.245770 env[1200]: time="2025-05-13T00:42:05.245731120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:05.246437 env[1200]: time="2025-05-13T00:42:05.246383383Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 13 00:42:05.246990 env[1200]: time="2025-05-13T00:42:05.246949636Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 13 00:42:06.485313 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1101292674.mount: Deactivated successfully. May 13 00:42:07.801150 env[1200]: time="2025-05-13T00:42:07.801085865Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:07.803246 env[1200]: time="2025-05-13T00:42:07.803205571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:07.804541 env[1200]: time="2025-05-13T00:42:07.804498336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:07.805780 env[1200]: time="2025-05-13T00:42:07.805743862Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:07.806086 env[1200]: time="2025-05-13T00:42:07.806057040Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 13 00:42:07.806630 env[1200]: time="2025-05-13T00:42:07.806602873Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 13 00:42:08.431194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4223645350.mount: Deactivated successfully. May 13 00:42:09.381118 env[1200]: time="2025-05-13T00:42:09.381055687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:09.382935 env[1200]: time="2025-05-13T00:42:09.382844071Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:09.384682 env[1200]: time="2025-05-13T00:42:09.384630091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:09.386163 env[1200]: time="2025-05-13T00:42:09.386136216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:09.386822 env[1200]: time="2025-05-13T00:42:09.386775696Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 13 00:42:09.387280 env[1200]: time="2025-05-13T00:42:09.387255616Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:42:10.042072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2265014057.mount: Deactivated successfully. May 13 00:42:10.047242 env[1200]: time="2025-05-13T00:42:10.047199813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:10.048810 env[1200]: time="2025-05-13T00:42:10.048779857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:10.050198 env[1200]: time="2025-05-13T00:42:10.050146560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:10.051618 env[1200]: time="2025-05-13T00:42:10.051593013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:10.052050 env[1200]: time="2025-05-13T00:42:10.052019343Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 00:42:10.052466 env[1200]: time="2025-05-13T00:42:10.052443769Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 13 00:42:10.557110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3806280193.mount: Deactivated successfully. May 13 00:42:13.988632 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:42:13.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:13.988802 systemd[1]: Stopped kubelet.service. May 13 00:42:13.989967 systemd[1]: Starting kubelet.service... May 13 00:42:13.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:13.995631 kernel: audit: type=1130 audit(1747096933.987:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:13.995707 kernel: audit: type=1131 audit(1747096933.987:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:14.065996 systemd[1]: Started kubelet.service. May 13 00:42:14.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:14.073438 kernel: audit: type=1130 audit(1747096934.064:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:14.441477 kubelet[1498]: E0513 00:42:14.441329 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:42:14.443208 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:42:14.443323 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:42:14.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:42:14.447441 kernel: audit: type=1131 audit(1747096934.442:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:42:14.769598 env[1200]: time="2025-05-13T00:42:14.769514936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:14.771844 env[1200]: time="2025-05-13T00:42:14.771808368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:14.773731 env[1200]: time="2025-05-13T00:42:14.773696169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:14.775426 env[1200]: time="2025-05-13T00:42:14.775371311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:14.776227 env[1200]: time="2025-05-13T00:42:14.776187943Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 13 00:42:16.753723 systemd[1]: Stopped kubelet.service. May 13 00:42:16.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:16.755660 systemd[1]: Starting kubelet.service... May 13 00:42:16.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:16.761308 kernel: audit: type=1130 audit(1747096936.752:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:16.761376 kernel: audit: type=1131 audit(1747096936.752:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:16.776300 systemd[1]: Reloading. May 13 00:42:16.847682 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-13T00:42:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:42:16.847712 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-13T00:42:16Z" level=info msg="torcx already run" May 13 00:42:17.126938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:42:17.126956 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:42:17.143497 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:42:17.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207750 kernel: audit: type=1400 audit(1747096937.200:238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207805 kernel: audit: type=1400 audit(1747096937.200:239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207827 kernel: audit: type=1400 audit(1747096937.200:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.210562 kernel: audit: type=1400 audit(1747096937.200:241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.206000 audit: BPF prog-id=40 op=LOAD May 13 00:42:17.206000 audit: BPF prog-id=38 op=UNLOAD May 13 00:42:17.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.211000 audit: BPF prog-id=41 op=LOAD May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit: BPF prog-id=42 op=LOAD May 13 00:42:17.212000 audit: BPF prog-id=24 op=UNLOAD May 13 00:42:17.212000 audit: BPF prog-id=25 op=UNLOAD May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.212000 audit: BPF prog-id=43 op=LOAD May 13 00:42:17.212000 audit: BPF prog-id=26 op=UNLOAD May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit: BPF prog-id=44 op=LOAD May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.213000 audit: BPF prog-id=45 op=LOAD May 13 00:42:17.213000 audit: BPF prog-id=27 op=UNLOAD May 13 00:42:17.213000 audit: BPF prog-id=28 op=UNLOAD May 13 00:42:17.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.214000 audit: BPF prog-id=46 op=LOAD May 13 00:42:17.214000 audit: BPF prog-id=33 op=UNLOAD May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit: BPF prog-id=47 op=LOAD May 13 00:42:17.215000 audit: BPF prog-id=29 op=UNLOAD May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit: BPF prog-id=48 op=LOAD May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.215000 audit: BPF prog-id=49 op=LOAD May 13 00:42:17.215000 audit: BPF prog-id=30 op=UNLOAD May 13 00:42:17.215000 audit: BPF prog-id=31 op=UNLOAD May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit: BPF prog-id=50 op=LOAD May 13 00:42:17.216000 audit: BPF prog-id=34 op=UNLOAD May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit: BPF prog-id=51 op=LOAD May 13 00:42:17.217000 audit: BPF prog-id=32 op=UNLOAD May 13 00:42:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit: BPF prog-id=52 op=LOAD May 13 00:42:17.218000 audit: BPF prog-id=35 op=UNLOAD May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit: BPF prog-id=53 op=LOAD May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.218000 audit: BPF prog-id=54 op=LOAD May 13 00:42:17.218000 audit: BPF prog-id=36 op=UNLOAD May 13 00:42:17.218000 audit: BPF prog-id=37 op=UNLOAD May 13 00:42:17.228193 systemd[1]: Started kubelet.service. May 13 00:42:17.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:17.229337 systemd[1]: Stopping kubelet.service... May 13 00:42:17.229574 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:42:17.229707 systemd[1]: Stopped kubelet.service. May 13 00:42:17.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:17.230858 systemd[1]: Starting kubelet.service... May 13 00:42:17.310280 systemd[1]: Started kubelet.service. May 13 00:42:17.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:17.368163 kubelet[1600]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:42:17.368163 kubelet[1600]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:42:17.368163 kubelet[1600]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:42:17.368524 kubelet[1600]: I0513 00:42:17.368239 1600 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:42:17.658965 kubelet[1600]: I0513 00:42:17.658916 1600 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:42:17.658965 kubelet[1600]: I0513 00:42:17.658943 1600 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:42:17.659194 kubelet[1600]: I0513 00:42:17.659172 1600 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:42:17.679589 kubelet[1600]: E0513 00:42:17.679533 1600 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.65:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:17.680587 kubelet[1600]: I0513 00:42:17.680566 1600 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:42:17.690389 kubelet[1600]: E0513 00:42:17.690349 1600 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:42:17.690389 kubelet[1600]: I0513 00:42:17.690381 1600 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:42:17.693784 kubelet[1600]: I0513 00:42:17.693755 1600 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:42:17.694506 kubelet[1600]: I0513 00:42:17.694455 1600 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:42:17.694686 kubelet[1600]: I0513 00:42:17.694495 1600 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:42:17.694686 kubelet[1600]: I0513 00:42:17.694680 1600 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:42:17.694686 kubelet[1600]: I0513 00:42:17.694688 1600 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:42:17.694862 kubelet[1600]: I0513 00:42:17.694805 1600 state_mem.go:36] "Initialized new in-memory state store" May 13 00:42:17.697308 kubelet[1600]: I0513 00:42:17.697279 1600 kubelet.go:446] "Attempting to sync node with API server" May 13 00:42:17.697308 kubelet[1600]: I0513 00:42:17.697310 1600 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:42:17.697403 kubelet[1600]: I0513 00:42:17.697331 1600 kubelet.go:352] "Adding apiserver pod source" May 13 00:42:17.697403 kubelet[1600]: I0513 00:42:17.697358 1600 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:42:17.713297 kubelet[1600]: I0513 00:42:17.713253 1600 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:42:17.713701 kubelet[1600]: I0513 00:42:17.713675 1600 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:42:17.724649 kubelet[1600]: W0513 00:42:17.724599 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.65:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:17.724720 kubelet[1600]: E0513 00:42:17.724664 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.65:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:17.727428 kubelet[1600]: W0513 00:42:17.727383 1600 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:42:17.727509 kubelet[1600]: W0513 00:42:17.727444 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.65:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:17.727540 kubelet[1600]: E0513 00:42:17.727502 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.65:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:17.731757 kubelet[1600]: I0513 00:42:17.731734 1600 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:42:17.731810 kubelet[1600]: I0513 00:42:17.731773 1600 server.go:1287] "Started kubelet" May 13 00:42:17.731835 kubelet[1600]: I0513 00:42:17.731819 1600 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:42:17.732609 kubelet[1600]: I0513 00:42:17.732587 1600 server.go:490] "Adding debug handlers to kubelet server" May 13 00:42:17.733000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.733000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:17.733000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bad020 a1=c000af91e8 a2=c000bacff0 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.733000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:17.733000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:17.733000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:17.733000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b9cbe0 a1=c000af9200 a2=c000bad0b0 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.733000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:17.735202 kubelet[1600]: I0513 00:42:17.734802 1600 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:42:17.735202 kubelet[1600]: I0513 00:42:17.734853 1600 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:42:17.735202 kubelet[1600]: I0513 00:42:17.734899 1600 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:42:17.735000 audit[1613]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.735000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd291a6fe0 a2=0 a3=7ffd291a6fcc items=0 ppid=1600 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:42:17.736000 audit[1614]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.736000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2e2cb0e0 a2=0 a3=7ffe2e2cb0cc items=0 ppid=1600 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:42:17.737727 kubelet[1600]: I0513 00:42:17.737016 1600 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:42:17.737727 kubelet[1600]: I0513 00:42:17.737257 1600 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:42:17.738450 kubelet[1600]: I0513 00:42:17.738137 1600 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:42:17.738450 kubelet[1600]: E0513 00:42:17.738310 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:17.742277 kubelet[1600]: I0513 00:42:17.742243 1600 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:42:17.742447 kubelet[1600]: I0513 00:42:17.742394 1600 reconciler.go:26] "Reconciler: start to sync state" May 13 00:42:17.741000 audit[1616]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.741000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff68a18e80 a2=0 a3=7fff68a18e6c items=0 ppid=1600 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:42:17.743745 kubelet[1600]: E0513 00:42:17.743710 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.65:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.65:6443: connect: connection refused" interval="200ms" May 13 00:42:17.743932 kubelet[1600]: W0513 00:42:17.743897 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.65:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:17.744045 kubelet[1600]: E0513 00:42:17.744022 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.65:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:17.744197 kubelet[1600]: E0513 00:42:17.743250 1600 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.65:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.65:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef6889ac6cdd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:42:17.731747037 +0000 UTC m=+0.417709314,LastTimestamp:2025-05-13 00:42:17.731747037 +0000 UTC m=+0.417709314,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:42:17.744197 kubelet[1600]: I0513 00:42:17.744185 1600 factory.go:221] Registration of the systemd container factory successfully May 13 00:42:17.744308 kubelet[1600]: I0513 00:42:17.744247 1600 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:42:17.744408 kubelet[1600]: E0513 00:42:17.744385 1600 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:42:17.744805 kubelet[1600]: I0513 00:42:17.744790 1600 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:42:17.743000 audit[1618]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.743000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcadf18d70 a2=0 a3=7ffcadf18d5c items=0 ppid=1600 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:42:17.745803 kubelet[1600]: I0513 00:42:17.745786 1600 factory.go:221] Registration of the containerd container factory successfully May 13 00:42:17.752000 audit[1625]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.752000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff771c63f0 a2=0 a3=7fff771c63dc items=0 ppid=1600 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:42:17.753937 kubelet[1600]: I0513 00:42:17.753905 1600 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:42:17.753000 audit[1627]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:17.753000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff636e4560 a2=0 a3=7fff636e454c items=0 ppid=1600 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:42:17.754904 kubelet[1600]: I0513 00:42:17.754879 1600 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:42:17.754904 kubelet[1600]: I0513 00:42:17.754903 1600 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:42:17.754971 kubelet[1600]: I0513 00:42:17.754922 1600 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:42:17.754971 kubelet[1600]: I0513 00:42:17.754930 1600 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:42:17.755013 kubelet[1600]: E0513 00:42:17.754968 1600 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:42:17.753000 audit[1628]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.753000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffcdec800 a2=0 a3=7ffffcdec7ec items=0 ppid=1600 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:42:17.755555 kubelet[1600]: W0513 00:42:17.755522 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.65:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:17.755657 kubelet[1600]: E0513 00:42:17.755629 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.65:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:17.754000 audit[1630]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:17.754000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff2a238a0 a2=0 a3=7ffff2a2388c items=0 ppid=1600 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:42:17.754000 audit[1631]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.754000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc54dd00c0 a2=0 a3=10e3 items=0 ppid=1600 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:42:17.755000 audit[1633]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:17.755000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe92467230 a2=0 a3=7ffe9246721c items=0 ppid=1600 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:42:17.757072 kubelet[1600]: I0513 00:42:17.756966 1600 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:42:17.757072 kubelet[1600]: I0513 00:42:17.756977 1600 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:42:17.757072 kubelet[1600]: I0513 00:42:17.756990 1600 state_mem.go:36] "Initialized new in-memory state store" May 13 00:42:17.755000 audit[1632]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:17.755000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc54c91c50 a2=0 a3=7ffc54c91c3c items=0 ppid=1600 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:42:17.756000 audit[1634]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:17.756000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc93c5b660 a2=0 a3=7ffc93c5b64c items=0 ppid=1600 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:17.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:42:17.839368 kubelet[1600]: E0513 00:42:17.839325 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:17.855795 kubelet[1600]: E0513 00:42:17.855761 1600 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:42:17.939944 kubelet[1600]: E0513 00:42:17.939821 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:17.944389 kubelet[1600]: E0513 00:42:17.944363 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.65:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.65:6443: connect: connection refused" interval="400ms" May 13 00:42:18.040792 kubelet[1600]: E0513 00:42:18.040756 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:18.056181 kubelet[1600]: E0513 00:42:18.056152 1600 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:42:18.141562 kubelet[1600]: E0513 00:42:18.141525 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:18.171014 kubelet[1600]: I0513 00:42:18.170986 1600 policy_none.go:49] "None policy: Start" May 13 00:42:18.171014 kubelet[1600]: I0513 00:42:18.171020 1600 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:42:18.171147 kubelet[1600]: I0513 00:42:18.171033 1600 state_mem.go:35] "Initializing new in-memory state store" May 13 00:42:18.176778 systemd[1]: Created slice kubepods.slice. May 13 00:42:18.180192 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:42:18.182304 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:42:18.189000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:18.189000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:18.189000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bac090 a1=c0009553b0 a2=c000bac000 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:18.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:18.191410 kubelet[1600]: I0513 00:42:18.190503 1600 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:42:18.191410 kubelet[1600]: I0513 00:42:18.190611 1600 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:42:18.191410 kubelet[1600]: I0513 00:42:18.190737 1600 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:42:18.191410 kubelet[1600]: I0513 00:42:18.190747 1600 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:42:18.191410 kubelet[1600]: I0513 00:42:18.190944 1600 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:42:18.192199 kubelet[1600]: E0513 00:42:18.192172 1600 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:42:18.192355 kubelet[1600]: E0513 00:42:18.192213 1600 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:42:18.292883 kubelet[1600]: I0513 00:42:18.292823 1600 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:18.293226 kubelet[1600]: E0513 00:42:18.293194 1600 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.65:6443/api/v1/nodes\": dial tcp 10.0.0.65:6443: connect: connection refused" node="localhost" May 13 00:42:18.345162 kubelet[1600]: E0513 00:42:18.345096 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.65:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.65:6443: connect: connection refused" interval="800ms" May 13 00:42:18.462855 systemd[1]: Created slice kubepods-burstable-poddf129a7e94c9f6266978fd7e8e35cb20.slice. May 13 00:42:18.468896 kubelet[1600]: E0513 00:42:18.468864 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:18.470978 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 13 00:42:18.472078 kubelet[1600]: E0513 00:42:18.472051 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:18.484307 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 13 00:42:18.485509 kubelet[1600]: E0513 00:42:18.485482 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:18.494255 kubelet[1600]: I0513 00:42:18.494230 1600 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:18.494654 kubelet[1600]: E0513 00:42:18.494623 1600 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.65:6443/api/v1/nodes\": dial tcp 10.0.0.65:6443: connect: connection refused" node="localhost" May 13 00:42:18.547222 kubelet[1600]: I0513 00:42:18.547190 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:18.547222 kubelet[1600]: I0513 00:42:18.547218 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:18.547322 kubelet[1600]: I0513 00:42:18.547236 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:42:18.547322 kubelet[1600]: I0513 00:42:18.547251 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:18.547322 kubelet[1600]: I0513 00:42:18.547264 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:18.547322 kubelet[1600]: I0513 00:42:18.547276 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:18.547322 kubelet[1600]: I0513 00:42:18.547288 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:18.547490 kubelet[1600]: I0513 00:42:18.547301 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:18.547490 kubelet[1600]: I0513 00:42:18.547315 1600 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:18.634887 kubelet[1600]: W0513 00:42:18.634852 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.65:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:18.635011 kubelet[1600]: E0513 00:42:18.634902 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.65:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:18.769317 kubelet[1600]: E0513 00:42:18.769282 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:18.769896 env[1200]: time="2025-05-13T00:42:18.769850422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:df129a7e94c9f6266978fd7e8e35cb20,Namespace:kube-system,Attempt:0,}" May 13 00:42:18.772981 kubelet[1600]: E0513 00:42:18.772959 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:18.773258 env[1200]: time="2025-05-13T00:42:18.773225162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 13 00:42:18.786494 kubelet[1600]: E0513 00:42:18.786466 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:18.786749 env[1200]: time="2025-05-13T00:42:18.786725665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 13 00:42:18.860852 kubelet[1600]: W0513 00:42:18.860808 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.65:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:18.860931 kubelet[1600]: E0513 00:42:18.860870 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.65:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:18.895915 kubelet[1600]: I0513 00:42:18.895898 1600 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:18.896155 kubelet[1600]: E0513 00:42:18.896125 1600 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.65:6443/api/v1/nodes\": dial tcp 10.0.0.65:6443: connect: connection refused" node="localhost" May 13 00:42:19.034604 kubelet[1600]: W0513 00:42:19.034456 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.65:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:19.034604 kubelet[1600]: E0513 00:42:19.034531 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.65:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:19.146144 kubelet[1600]: E0513 00:42:19.146093 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.65:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.65:6443: connect: connection refused" interval="1.6s" May 13 00:42:19.299865 kubelet[1600]: W0513 00:42:19.299785 1600 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.65:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.65:6443: connect: connection refused May 13 00:42:19.299865 kubelet[1600]: E0513 00:42:19.299821 1600 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.65:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:19.697432 kubelet[1600]: I0513 00:42:19.697306 1600 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:19.697824 kubelet[1600]: E0513 00:42:19.697664 1600 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.65:6443/api/v1/nodes\": dial tcp 10.0.0.65:6443: connect: connection refused" node="localhost" May 13 00:42:19.712515 kubelet[1600]: E0513 00:42:19.712481 1600 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.65:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.65:6443: connect: connection refused" logger="UnhandledError" May 13 00:42:20.039691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2689764058.mount: Deactivated successfully. May 13 00:42:20.045454 env[1200]: time="2025-05-13T00:42:20.045386794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.049145 env[1200]: time="2025-05-13T00:42:20.049105459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.050187 env[1200]: time="2025-05-13T00:42:20.050165958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.052226 env[1200]: time="2025-05-13T00:42:20.052195515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.055462 env[1200]: time="2025-05-13T00:42:20.055430463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.056428 env[1200]: time="2025-05-13T00:42:20.056376117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.057534 env[1200]: time="2025-05-13T00:42:20.057499153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.059166 env[1200]: time="2025-05-13T00:42:20.059136615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.060846 env[1200]: time="2025-05-13T00:42:20.060813580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.062469 env[1200]: time="2025-05-13T00:42:20.062366222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.063157 env[1200]: time="2025-05-13T00:42:20.063128121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.064926 env[1200]: time="2025-05-13T00:42:20.064889275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:20.086985 env[1200]: time="2025-05-13T00:42:20.086919748Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:20.086985 env[1200]: time="2025-05-13T00:42:20.086960875Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:20.086985 env[1200]: time="2025-05-13T00:42:20.086972737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:20.087197 env[1200]: time="2025-05-13T00:42:20.087095197Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ed429db271a77ca3da73c740ffcbde1d181b874fae4afe32fd8d09071853949 pid=1641 runtime=io.containerd.runc.v2 May 13 00:42:20.101286 systemd[1]: Started cri-containerd-8ed429db271a77ca3da73c740ffcbde1d181b874fae4afe32fd8d09071853949.scope. May 13 00:42:20.102038 env[1200]: time="2025-05-13T00:42:20.101894787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:20.102038 env[1200]: time="2025-05-13T00:42:20.101922809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:20.102038 env[1200]: time="2025-05-13T00:42:20.101932097Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:20.102186 env[1200]: time="2025-05-13T00:42:20.102045930Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b335a1e9e2211ed90d1893cf2a58c7eae2fbd43979bb40a5bb26b13fd7a0aa5 pid=1666 runtime=io.containerd.runc.v2 May 13 00:42:20.107603 env[1200]: time="2025-05-13T00:42:20.107510600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:20.107603 env[1200]: time="2025-05-13T00:42:20.107569060Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:20.107603 env[1200]: time="2025-05-13T00:42:20.107581123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:20.107814 env[1200]: time="2025-05-13T00:42:20.107736604Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4fc6994e38126359505af8f1b03f6e69b0084ab5df8957e71d7889a8f9ba8bd1 pid=1682 runtime=io.containerd.runc.v2 May 13 00:42:20.124061 kernel: kauditd_printk_skb: 219 callbacks suppressed May 13 00:42:20.124210 kernel: audit: type=1400 audit(1747096940.109:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.124243 kernel: audit: type=1400 audit(1747096940.109:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.124272 kernel: audit: type=1400 audit(1747096940.109:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.115636 systemd[1]: Started cri-containerd-6b335a1e9e2211ed90d1893cf2a58c7eae2fbd43979bb40a5bb26b13fd7a0aa5.scope. May 13 00:42:20.120611 systemd[1]: Started cri-containerd-4fc6994e38126359505af8f1b03f6e69b0084ab5df8957e71d7889a8f9ba8bd1.scope. May 13 00:42:20.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.130991 kernel: audit: type=1400 audit(1747096940.109:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.131101 kernel: audit: type=1400 audit(1747096940.109:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.137319 kernel: audit: type=1400 audit(1747096940.109:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.137372 kernel: audit: type=1400 audit(1747096940.109:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.141502 kernel: audit: type=1400 audit(1747096940.109:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.141523 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:42:20.141543 kernel: audit: type=1400 audit(1747096940.109:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.109000 audit: BPF prog-id=55 op=LOAD May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1641 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865643432396462323731613737636133646137336337343066666362 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=1641 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865643432396462323731613737636133646137336337343066666362 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.111000 audit: BPF prog-id=56 op=LOAD May 13 00:42:20.111000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000280f20 items=0 ppid=1641 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865643432396462323731613737636133646137336337343066666362 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.118000 audit: BPF prog-id=57 op=LOAD May 13 00:42:20.118000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000280f68 items=0 ppid=1641 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865643432396462323731613737636133646137336337343066666362 May 13 00:42:20.123000 audit: BPF prog-id=57 op=UNLOAD May 13 00:42:20.123000 audit: BPF prog-id=56 op=UNLOAD May 13 00:42:20.123000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.123000 audit: BPF prog-id=58 op=LOAD May 13 00:42:20.123000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c000281378 items=0 ppid=1641 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865643432396462323731613737636133646137336337343066666362 May 13 00:42:20.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.135000 audit: BPF prog-id=59 op=LOAD May 13 00:42:20.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.142000 audit: BPF prog-id=60 op=LOAD May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001a16b0 a2=3c a3=c items=0 ppid=1682 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633639393465333831323633353935303561663866316230336636 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit: BPF prog-id=61 op=LOAD May 13 00:42:20.143000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001a19d8 a2=78 a3=c00031ea20 items=0 ppid=1682 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633639393465333831323633353935303561663866316230336636 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333335613165396532323131656439306431383933636632613538 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit: BPF prog-id=62 op=LOAD May 13 00:42:20.143000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001a1770 a2=78 a3=c00031ea68 items=0 ppid=1682 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633639393465333831323633353935303561663866316230336636 May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333335613165396532323131656439306431383933636632613538 May 13 00:42:20.143000 audit: BPF prog-id=62 op=UNLOAD May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit: BPF prog-id=61 op=UNLOAD May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002885f0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333335613165396532323131656439306431383933636632613538 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.143000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001a1c30 a2=78 a3=c00031ee78 items=0 ppid=1682 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633639393465333831323633353935303561663866316230336636 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit: BPF prog-id=65 op=LOAD May 13 00:42:20.144000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000288638 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333335613165396532323131656439306431383933636632613538 May 13 00:42:20.144000 audit: BPF prog-id=65 op=UNLOAD May 13 00:42:20.144000 audit: BPF prog-id=63 op=UNLOAD May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.144000 audit: BPF prog-id=66 op=LOAD May 13 00:42:20.144000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000288a48 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333335613165396532323131656439306431383933636632613538 May 13 00:42:20.169929 env[1200]: time="2025-05-13T00:42:20.169892741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:df129a7e94c9f6266978fd7e8e35cb20,Namespace:kube-system,Attempt:0,} returns sandbox id \"8ed429db271a77ca3da73c740ffcbde1d181b874fae4afe32fd8d09071853949\"" May 13 00:42:20.170735 env[1200]: time="2025-05-13T00:42:20.170691369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"6b335a1e9e2211ed90d1893cf2a58c7eae2fbd43979bb40a5bb26b13fd7a0aa5\"" May 13 00:42:20.171556 kubelet[1600]: E0513 00:42:20.171355 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:20.171556 kubelet[1600]: E0513 00:42:20.171375 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:20.173358 env[1200]: time="2025-05-13T00:42:20.173172483Z" level=info msg="CreateContainer within sandbox \"8ed429db271a77ca3da73c740ffcbde1d181b874fae4afe32fd8d09071853949\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:42:20.173589 env[1200]: time="2025-05-13T00:42:20.173570039Z" level=info msg="CreateContainer within sandbox \"6b335a1e9e2211ed90d1893cf2a58c7eae2fbd43979bb40a5bb26b13fd7a0aa5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:42:20.175780 env[1200]: time="2025-05-13T00:42:20.175758053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"4fc6994e38126359505af8f1b03f6e69b0084ab5df8957e71d7889a8f9ba8bd1\"" May 13 00:42:20.176321 kubelet[1600]: E0513 00:42:20.176223 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:20.177840 env[1200]: time="2025-05-13T00:42:20.177809952Z" level=info msg="CreateContainer within sandbox \"4fc6994e38126359505af8f1b03f6e69b0084ab5df8957e71d7889a8f9ba8bd1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:42:20.194241 env[1200]: time="2025-05-13T00:42:20.194201107Z" level=info msg="CreateContainer within sandbox \"8ed429db271a77ca3da73c740ffcbde1d181b874fae4afe32fd8d09071853949\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e17447ef2ce25e16d1ac1cf6aed3b2743a3ae23f03ad912b9748861695434afc\"" May 13 00:42:20.194868 env[1200]: time="2025-05-13T00:42:20.194842971Z" level=info msg="StartContainer for \"e17447ef2ce25e16d1ac1cf6aed3b2743a3ae23f03ad912b9748861695434afc\"" May 13 00:42:20.200253 env[1200]: time="2025-05-13T00:42:20.200207473Z" level=info msg="CreateContainer within sandbox \"6b335a1e9e2211ed90d1893cf2a58c7eae2fbd43979bb40a5bb26b13fd7a0aa5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"822bf2e7c8af147d6fa87067929a371ce456cf06c0e1f1ddd39254fb7e4a50da\"" May 13 00:42:20.200688 env[1200]: time="2025-05-13T00:42:20.200667917Z" level=info msg="StartContainer for \"822bf2e7c8af147d6fa87067929a371ce456cf06c0e1f1ddd39254fb7e4a50da\"" May 13 00:42:20.204320 env[1200]: time="2025-05-13T00:42:20.204297976Z" level=info msg="CreateContainer within sandbox \"4fc6994e38126359505af8f1b03f6e69b0084ab5df8957e71d7889a8f9ba8bd1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bdeb1358945533200bb988a430f997388d55cc8a404e2b2c59edb7d5d9827577\"" May 13 00:42:20.204702 env[1200]: time="2025-05-13T00:42:20.204682768Z" level=info msg="StartContainer for \"bdeb1358945533200bb988a430f997388d55cc8a404e2b2c59edb7d5d9827577\"" May 13 00:42:20.207291 systemd[1]: Started cri-containerd-e17447ef2ce25e16d1ac1cf6aed3b2743a3ae23f03ad912b9748861695434afc.scope. May 13 00:42:20.216922 systemd[1]: Started cri-containerd-822bf2e7c8af147d6fa87067929a371ce456cf06c0e1f1ddd39254fb7e4a50da.scope. May 13 00:42:20.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.217000 audit: BPF prog-id=67 op=LOAD May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1641 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531373434376566326365323565313664316163316366366165643362 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1641 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531373434376566326365323565313664316163316366366165643362 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit: BPF prog-id=68 op=LOAD May 13 00:42:20.218000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a9f0 items=0 ppid=1641 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531373434376566326365323565313664316163316366366165643362 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit: BPF prog-id=69 op=LOAD May 13 00:42:20.218000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028aa38 items=0 ppid=1641 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531373434376566326365323565313664316163316366366165643362 May 13 00:42:20.218000 audit: BPF prog-id=69 op=UNLOAD May 13 00:42:20.218000 audit: BPF prog-id=68 op=UNLOAD May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.218000 audit: BPF prog-id=70 op=LOAD May 13 00:42:20.218000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028ae48 items=0 ppid=1641 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531373434376566326365323565313664316163316366366165643362 May 13 00:42:20.224893 systemd[1]: Started cri-containerd-bdeb1358945533200bb988a430f997388d55cc8a404e2b2c59edb7d5d9827577.scope. May 13 00:42:20.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit: BPF prog-id=71 op=LOAD May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=1666 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326266326537633861663134376436666138373036373932396133 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=8 items=0 ppid=1666 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326266326537633861663134376436666138373036373932396133 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit: BPF prog-id=72 op=LOAD May 13 00:42:20.231000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c000323110 items=0 ppid=1666 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326266326537633861663134376436666138373036373932396133 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit: BPF prog-id=73 op=LOAD May 13 00:42:20.231000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c000323158 items=0 ppid=1666 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326266326537633861663134376436666138373036373932396133 May 13 00:42:20.231000 audit: BPF prog-id=73 op=UNLOAD May 13 00:42:20.231000 audit: BPF prog-id=72 op=UNLOAD May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.231000 audit: BPF prog-id=74 op=LOAD May 13 00:42:20.231000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c000323568 items=0 ppid=1666 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326266326537633861663134376436666138373036373932396133 May 13 00:42:20.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.234000 audit: BPF prog-id=75 op=LOAD May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1682 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656231333538393435353333323030626239383861343330663939 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1682 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656231333538393435353333323030626239383861343330663939 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit: BPF prog-id=76 op=LOAD May 13 00:42:20.235000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003058c0 items=0 ppid=1682 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656231333538393435353333323030626239383861343330663939 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit: BPF prog-id=77 op=LOAD May 13 00:42:20.235000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000305908 items=0 ppid=1682 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656231333538393435353333323030626239383861343330663939 May 13 00:42:20.235000 audit: BPF prog-id=77 op=UNLOAD May 13 00:42:20.235000 audit: BPF prog-id=76 op=UNLOAD May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:20.235000 audit: BPF prog-id=78 op=LOAD May 13 00:42:20.235000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000305d18 items=0 ppid=1682 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:20.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656231333538393435353333323030626239383861343330663939 May 13 00:42:20.260470 env[1200]: time="2025-05-13T00:42:20.259647295Z" level=info msg="StartContainer for \"822bf2e7c8af147d6fa87067929a371ce456cf06c0e1f1ddd39254fb7e4a50da\" returns successfully" May 13 00:42:20.261437 env[1200]: time="2025-05-13T00:42:20.261380777Z" level=info msg="StartContainer for \"e17447ef2ce25e16d1ac1cf6aed3b2743a3ae23f03ad912b9748861695434afc\" returns successfully" May 13 00:42:20.269639 env[1200]: time="2025-05-13T00:42:20.269594263Z" level=info msg="StartContainer for \"bdeb1358945533200bb988a430f997388d55cc8a404e2b2c59edb7d5d9827577\" returns successfully" May 13 00:42:20.761634 kubelet[1600]: E0513 00:42:20.761603 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:20.761942 kubelet[1600]: E0513 00:42:20.761703 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:20.763041 kubelet[1600]: E0513 00:42:20.763023 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:20.763116 kubelet[1600]: E0513 00:42:20.763100 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:20.764234 kubelet[1600]: E0513 00:42:20.764210 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:20.764300 kubelet[1600]: E0513 00:42:20.764285 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:21.123000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.123000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000b98000 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:21.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:21.124000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.124000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000500880 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:21.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:21.221000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.221000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0042be1e0 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.221000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.227000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.227000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.227000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00896ff40 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.227000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008293020 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.229000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.229000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c003e1d2f0 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.232000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.232000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0045ba4a0 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.232000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.232000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:21.232000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0069a3c80 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:42:21.232000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:42:21.257239 kubelet[1600]: E0513 00:42:21.257200 1600 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:42:21.299064 kubelet[1600]: I0513 00:42:21.299018 1600 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:21.416455 kubelet[1600]: I0513 00:42:21.416304 1600 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:42:21.416455 kubelet[1600]: E0513 00:42:21.416358 1600 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 13 00:42:21.419359 kubelet[1600]: E0513 00:42:21.419317 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:21.520372 kubelet[1600]: E0513 00:42:21.520282 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:21.621235 kubelet[1600]: E0513 00:42:21.621189 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:21.722438 kubelet[1600]: E0513 00:42:21.722285 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:21.766152 kubelet[1600]: E0513 00:42:21.766122 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:21.766493 kubelet[1600]: E0513 00:42:21.766227 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:21.766493 kubelet[1600]: E0513 00:42:21.766411 1600 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:42:21.766575 kubelet[1600]: E0513 00:42:21.766548 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:21.823014 kubelet[1600]: E0513 00:42:21.822955 1600 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:42:21.839457 kubelet[1600]: I0513 00:42:21.839404 1600 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:42:21.843407 kubelet[1600]: E0513 00:42:21.843384 1600 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 13 00:42:21.843407 kubelet[1600]: I0513 00:42:21.843405 1600 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:42:21.844664 kubelet[1600]: E0513 00:42:21.844637 1600 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 13 00:42:21.844664 kubelet[1600]: I0513 00:42:21.844652 1600 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:42:21.845858 kubelet[1600]: E0513 00:42:21.845835 1600 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 13 00:42:22.725190 kubelet[1600]: I0513 00:42:22.725157 1600 apiserver.go:52] "Watching apiserver" May 13 00:42:22.743399 kubelet[1600]: I0513 00:42:22.743371 1600 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:42:23.070374 kubelet[1600]: I0513 00:42:23.070349 1600 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.075525 kubelet[1600]: E0513 00:42:23.075508 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:23.278552 systemd[1]: Reloading. May 13 00:42:23.345918 /usr/lib/systemd/system-generators/torcx-generator[1894]: time="2025-05-13T00:42:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:42:23.345946 /usr/lib/systemd/system-generators/torcx-generator[1894]: time="2025-05-13T00:42:23Z" level=info msg="torcx already run" May 13 00:42:23.410434 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:42:23.410450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:42:23.428855 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:42:23.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit: BPF prog-id=79 op=LOAD May 13 00:42:23.503000 audit: BPF prog-id=67 op=UNLOAD May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.503000 audit: BPF prog-id=80 op=LOAD May 13 00:42:23.503000 audit: BPF prog-id=40 op=UNLOAD May 13 00:42:23.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.504000 audit: BPF prog-id=81 op=LOAD May 13 00:42:23.504000 audit: BPF prog-id=75 op=UNLOAD May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit: BPF prog-id=82 op=LOAD May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit: BPF prog-id=83 op=LOAD May 13 00:42:23.505000 audit: BPF prog-id=41 op=UNLOAD May 13 00:42:23.505000 audit: BPF prog-id=42 op=UNLOAD May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit: BPF prog-id=84 op=LOAD May 13 00:42:23.506000 audit: BPF prog-id=43 op=UNLOAD May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit: BPF prog-id=85 op=LOAD May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.506000 audit: BPF prog-id=86 op=LOAD May 13 00:42:23.506000 audit: BPF prog-id=44 op=UNLOAD May 13 00:42:23.506000 audit: BPF prog-id=45 op=UNLOAD May 13 00:42:23.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit: BPF prog-id=87 op=LOAD May 13 00:42:23.507000 audit: BPF prog-id=60 op=UNLOAD May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.507000 audit: BPF prog-id=88 op=LOAD May 13 00:42:23.507000 audit: BPF prog-id=71 op=UNLOAD May 13 00:42:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.508000 audit: BPF prog-id=89 op=LOAD May 13 00:42:23.508000 audit: BPF prog-id=55 op=UNLOAD May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit: BPF prog-id=90 op=LOAD May 13 00:42:23.509000 audit: BPF prog-id=46 op=UNLOAD May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.509000 audit: BPF prog-id=91 op=LOAD May 13 00:42:23.510000 audit: BPF prog-id=47 op=UNLOAD May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit: BPF prog-id=92 op=LOAD May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit: BPF prog-id=93 op=LOAD May 13 00:42:23.510000 audit: BPF prog-id=48 op=UNLOAD May 13 00:42:23.510000 audit: BPF prog-id=49 op=UNLOAD May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.510000 audit: BPF prog-id=94 op=LOAD May 13 00:42:23.510000 audit: BPF prog-id=50 op=UNLOAD May 13 00:42:23.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.511000 audit: BPF prog-id=95 op=LOAD May 13 00:42:23.511000 audit: BPF prog-id=51 op=UNLOAD May 13 00:42:23.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.512000 audit: BPF prog-id=96 op=LOAD May 13 00:42:23.512000 audit: BPF prog-id=59 op=UNLOAD May 13 00:42:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit: BPF prog-id=97 op=LOAD May 13 00:42:23.514000 audit: BPF prog-id=52 op=UNLOAD May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit: BPF prog-id=98 op=LOAD May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.514000 audit: BPF prog-id=99 op=LOAD May 13 00:42:23.514000 audit: BPF prog-id=53 op=UNLOAD May 13 00:42:23.514000 audit: BPF prog-id=54 op=UNLOAD May 13 00:42:23.526041 systemd[1]: Stopping kubelet.service... May 13 00:42:23.549820 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:42:23.550035 systemd[1]: Stopped kubelet.service. May 13 00:42:23.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:23.551978 systemd[1]: Starting kubelet.service... May 13 00:42:23.637542 systemd[1]: Started kubelet.service. May 13 00:42:23.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:23.669908 kubelet[1939]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:42:23.669908 kubelet[1939]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:42:23.669908 kubelet[1939]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:42:23.670228 kubelet[1939]: I0513 00:42:23.669952 1939 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:42:23.676440 kubelet[1939]: I0513 00:42:23.676376 1939 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:42:23.676440 kubelet[1939]: I0513 00:42:23.676401 1939 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:42:23.677080 kubelet[1939]: I0513 00:42:23.677048 1939 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:42:23.681153 kubelet[1939]: I0513 00:42:23.681086 1939 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:42:23.685030 kubelet[1939]: I0513 00:42:23.684956 1939 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:42:23.688504 kubelet[1939]: E0513 00:42:23.688460 1939 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:42:23.688670 kubelet[1939]: I0513 00:42:23.688650 1939 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:42:23.692517 kubelet[1939]: I0513 00:42:23.692492 1939 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:42:23.692738 kubelet[1939]: I0513 00:42:23.692703 1939 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:42:23.692899 kubelet[1939]: I0513 00:42:23.692729 1939 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:42:23.692899 kubelet[1939]: I0513 00:42:23.692898 1939 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:42:23.693061 kubelet[1939]: I0513 00:42:23.692905 1939 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:42:23.693061 kubelet[1939]: I0513 00:42:23.692946 1939 state_mem.go:36] "Initialized new in-memory state store" May 13 00:42:23.693293 kubelet[1939]: I0513 00:42:23.693269 1939 kubelet.go:446] "Attempting to sync node with API server" May 13 00:42:23.693337 kubelet[1939]: I0513 00:42:23.693297 1939 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:42:23.693337 kubelet[1939]: I0513 00:42:23.693313 1939 kubelet.go:352] "Adding apiserver pod source" May 13 00:42:23.693337 kubelet[1939]: I0513 00:42:23.693321 1939 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:42:23.702043 kubelet[1939]: I0513 00:42:23.701999 1939 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:42:23.702359 kubelet[1939]: I0513 00:42:23.702338 1939 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:42:23.702819 kubelet[1939]: I0513 00:42:23.702797 1939 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:42:23.702866 kubelet[1939]: I0513 00:42:23.702827 1939 server.go:1287] "Started kubelet" May 13 00:42:23.702970 kubelet[1939]: I0513 00:42:23.702902 1939 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:42:23.703122 kubelet[1939]: I0513 00:42:23.703073 1939 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:42:23.703323 kubelet[1939]: I0513 00:42:23.703292 1939 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:42:23.704640 kubelet[1939]: I0513 00:42:23.704609 1939 server.go:490] "Adding debug handlers to kubelet server" May 13 00:42:23.703000 audit[1939]: AVC avc: denied { mac_admin } for pid=1939 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.703000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:23.703000 audit[1939]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000693d10 a1=c0009dc480 a2=c000693ce0 a3=25 items=0 ppid=1 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:23.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:23.703000 audit[1939]: AVC avc: denied { mac_admin } for pid=1939 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.703000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:23.703000 audit[1939]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d5bd60 a1=c0009dc498 a2=c000693da0 a3=25 items=0 ppid=1 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:23.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:23.705076 kubelet[1939]: I0513 00:42:23.704702 1939 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:42:23.705076 kubelet[1939]: I0513 00:42:23.704743 1939 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:42:23.705076 kubelet[1939]: I0513 00:42:23.704770 1939 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:42:23.706308 kubelet[1939]: I0513 00:42:23.706268 1939 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:42:23.707022 kubelet[1939]: I0513 00:42:23.706589 1939 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:42:23.707258 kubelet[1939]: I0513 00:42:23.707231 1939 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:42:23.707566 kubelet[1939]: I0513 00:42:23.707541 1939 reconciler.go:26] "Reconciler: start to sync state" May 13 00:42:23.707621 kubelet[1939]: I0513 00:42:23.707588 1939 factory.go:221] Registration of the systemd container factory successfully May 13 00:42:23.707876 kubelet[1939]: I0513 00:42:23.707651 1939 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:42:23.708640 kubelet[1939]: E0513 00:42:23.708597 1939 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:42:23.709042 kubelet[1939]: I0513 00:42:23.709016 1939 factory.go:221] Registration of the containerd container factory successfully May 13 00:42:23.720884 kubelet[1939]: I0513 00:42:23.720837 1939 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:42:23.721583 kubelet[1939]: I0513 00:42:23.721562 1939 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:42:23.721638 kubelet[1939]: I0513 00:42:23.721587 1939 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:42:23.721638 kubelet[1939]: I0513 00:42:23.721605 1939 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:42:23.721638 kubelet[1939]: I0513 00:42:23.721612 1939 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:42:23.721798 kubelet[1939]: E0513 00:42:23.721646 1939 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:42:23.743231 kubelet[1939]: I0513 00:42:23.743203 1939 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:42:23.743231 kubelet[1939]: I0513 00:42:23.743221 1939 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:42:23.743231 kubelet[1939]: I0513 00:42:23.743237 1939 state_mem.go:36] "Initialized new in-memory state store" May 13 00:42:23.743480 kubelet[1939]: I0513 00:42:23.743372 1939 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:42:23.743480 kubelet[1939]: I0513 00:42:23.743383 1939 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:42:23.743480 kubelet[1939]: I0513 00:42:23.743405 1939 policy_none.go:49] "None policy: Start" May 13 00:42:23.743480 kubelet[1939]: I0513 00:42:23.743447 1939 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:42:23.743480 kubelet[1939]: I0513 00:42:23.743459 1939 state_mem.go:35] "Initializing new in-memory state store" May 13 00:42:23.743594 kubelet[1939]: I0513 00:42:23.743570 1939 state_mem.go:75] "Updated machine memory state" May 13 00:42:23.746341 kubelet[1939]: I0513 00:42:23.746304 1939 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:42:23.744000 audit[1939]: AVC avc: denied { mac_admin } for pid=1939 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:23.744000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:42:23.744000 audit[1939]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011e4330 a1=c000b74750 a2=c0011e4300 a3=25 items=0 ppid=1 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:23.744000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:42:23.746583 kubelet[1939]: I0513 00:42:23.746381 1939 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:42:23.746583 kubelet[1939]: I0513 00:42:23.746505 1939 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:42:23.746583 kubelet[1939]: I0513 00:42:23.746516 1939 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:42:23.747104 kubelet[1939]: I0513 00:42:23.747076 1939 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:42:23.747232 kubelet[1939]: E0513 00:42:23.747213 1939 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:42:23.822862 kubelet[1939]: I0513 00:42:23.822813 1939 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:42:23.823017 kubelet[1939]: I0513 00:42:23.822899 1939 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:42:23.823258 kubelet[1939]: I0513 00:42:23.823237 1939 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.829549 kubelet[1939]: E0513 00:42:23.829493 1939 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.850568 kubelet[1939]: I0513 00:42:23.850545 1939 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:42:23.858298 kubelet[1939]: I0513 00:42:23.858248 1939 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 13 00:42:23.858477 kubelet[1939]: I0513 00:42:23.858316 1939 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:42:23.909192 kubelet[1939]: I0513 00:42:23.909088 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.909192 kubelet[1939]: I0513 00:42:23.909123 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.909192 kubelet[1939]: I0513 00:42:23.909142 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:42:23.909192 kubelet[1939]: I0513 00:42:23.909157 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:23.909192 kubelet[1939]: I0513 00:42:23.909172 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:23.909438 kubelet[1939]: I0513 00:42:23.909190 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.909438 kubelet[1939]: I0513 00:42:23.909202 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.909438 kubelet[1939]: I0513 00:42:23.909217 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:42:23.909438 kubelet[1939]: I0513 00:42:23.909232 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/df129a7e94c9f6266978fd7e8e35cb20-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"df129a7e94c9f6266978fd7e8e35cb20\") " pod="kube-system/kube-apiserver-localhost" May 13 00:42:24.130363 kubelet[1939]: E0513 00:42:24.130331 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.130363 kubelet[1939]: E0513 00:42:24.130355 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.130644 kubelet[1939]: E0513 00:42:24.130629 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.693877 kubelet[1939]: I0513 00:42:24.693824 1939 apiserver.go:52] "Watching apiserver" May 13 00:42:24.707443 kubelet[1939]: I0513 00:42:24.707390 1939 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:42:24.735629 kubelet[1939]: E0513 00:42:24.735576 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.735844 kubelet[1939]: E0513 00:42:24.735712 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.735844 kubelet[1939]: I0513 00:42:24.735808 1939 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:42:24.749783 kubelet[1939]: E0513 00:42:24.749729 1939 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:42:24.749983 kubelet[1939]: E0513 00:42:24.749952 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:24.809279 kubelet[1939]: I0513 00:42:24.809217 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.8092004080000001 podStartE2EDuration="1.809200408s" podCreationTimestamp="2025-05-13 00:42:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:42:24.799425082 +0000 UTC m=+1.159296701" watchObservedRunningTime="2025-05-13 00:42:24.809200408 +0000 UTC m=+1.169072027" May 13 00:42:24.818232 kubelet[1939]: I0513 00:42:24.818162 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.818141342 podStartE2EDuration="1.818141342s" podCreationTimestamp="2025-05-13 00:42:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:42:24.809866306 +0000 UTC m=+1.169737925" watchObservedRunningTime="2025-05-13 00:42:24.818141342 +0000 UTC m=+1.178012961" May 13 00:42:24.834730 kubelet[1939]: I0513 00:42:24.834659 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.83463793 podStartE2EDuration="1.83463793s" podCreationTimestamp="2025-05-13 00:42:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:42:24.818530784 +0000 UTC m=+1.178402393" watchObservedRunningTime="2025-05-13 00:42:24.83463793 +0000 UTC m=+1.194509549" May 13 00:42:25.709252 kernel: kauditd_printk_skb: 636 callbacks suppressed May 13 00:42:25.709440 kernel: audit: type=1400 audit(1747096945.703:784): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.703000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.703000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b4f000 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.708000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.719030 kernel: audit: type=1300 audit(1747096945.703:784): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b4f000 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.719106 kernel: audit: type=1400 audit(1747096945.708:785): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.719135 kernel: audit: type=1300 audit(1747096945.708:785): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378800 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.708000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378800 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:25.730450 kernel: audit: type=1327 audit(1747096945.708:785): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:25.708000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.708000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378840 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.739643 kernel: audit: type=1400 audit(1747096945.708:786): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.739727 kernel: audit: type=1300 audit(1747096945.708:786): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378840 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.744123 kernel: audit: type=1327 audit(1747096945.708:786): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:25.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:25.744254 kubelet[1939]: E0513 00:42:25.740853 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:25.744254 kubelet[1939]: E0513 00:42:25.741246 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:25.709000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.753955 kernel: audit: type=1400 audit(1747096945.709:787): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:42:25.754004 kernel: audit: type=1300 audit(1747096945.709:787): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378b80 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.709000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378b80 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:25.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:25.703000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:26.193000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:42:26.193000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00055dbc0 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:42:26.193000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:42:26.742641 kubelet[1939]: E0513 00:42:26.742602 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:28.460327 sudo[1339]: pam_unix(sudo:session): session closed for user root May 13 00:42:28.458000 audit[1339]: USER_END pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:42:28.459000 audit[1339]: CRED_DISP pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:42:28.461337 sshd[1336]: pam_unix(sshd:session): session closed for user core May 13 00:42:28.460000 audit[1336]: USER_END pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:28.460000 audit[1336]: CRED_DISP pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:28.463103 systemd[1]: sshd@6-10.0.0.65:22-10.0.0.1:59598.service: Deactivated successfully. May 13 00:42:28.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.65:22-10.0.0.1:59598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:28.463841 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:42:28.463973 systemd[1]: session-7.scope: Consumed 3.961s CPU time. May 13 00:42:28.464448 systemd-logind[1189]: Session 7 logged out. Waiting for processes to exit. May 13 00:42:28.465090 systemd-logind[1189]: Removed session 7. May 13 00:42:30.191800 kubelet[1939]: I0513 00:42:30.191767 1939 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:42:30.192155 env[1200]: time="2025-05-13T00:42:30.192071997Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:42:30.192320 kubelet[1939]: I0513 00:42:30.192244 1939 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:42:32.118999 systemd[1]: Created slice kubepods-besteffort-podce66d9e3_e374_4456_a5b8_3042d9b0ece9.slice. May 13 00:42:32.144702 systemd[1]: Created slice kubepods-besteffort-pode5deb638_8442_4be9_8ef4_3bd6bb82ce53.slice. May 13 00:42:32.175797 kubelet[1939]: I0513 00:42:32.175747 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ce66d9e3-e374-4456-a5b8-3042d9b0ece9-kube-proxy\") pod \"kube-proxy-m4475\" (UID: \"ce66d9e3-e374-4456-a5b8-3042d9b0ece9\") " pod="kube-system/kube-proxy-m4475" May 13 00:42:32.175797 kubelet[1939]: I0513 00:42:32.175783 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zr6n\" (UniqueName: \"kubernetes.io/projected/ce66d9e3-e374-4456-a5b8-3042d9b0ece9-kube-api-access-6zr6n\") pod \"kube-proxy-m4475\" (UID: \"ce66d9e3-e374-4456-a5b8-3042d9b0ece9\") " pod="kube-system/kube-proxy-m4475" May 13 00:42:32.175797 kubelet[1939]: I0513 00:42:32.175808 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ce66d9e3-e374-4456-a5b8-3042d9b0ece9-xtables-lock\") pod \"kube-proxy-m4475\" (UID: \"ce66d9e3-e374-4456-a5b8-3042d9b0ece9\") " pod="kube-system/kube-proxy-m4475" May 13 00:42:32.176200 kubelet[1939]: I0513 00:42:32.175923 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e5deb638-8442-4be9-8ef4-3bd6bb82ce53-var-lib-calico\") pod \"tigera-operator-789496d6f5-n8pt5\" (UID: \"e5deb638-8442-4be9-8ef4-3bd6bb82ce53\") " pod="tigera-operator/tigera-operator-789496d6f5-n8pt5" May 13 00:42:32.176200 kubelet[1939]: I0513 00:42:32.175985 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ce66d9e3-e374-4456-a5b8-3042d9b0ece9-lib-modules\") pod \"kube-proxy-m4475\" (UID: \"ce66d9e3-e374-4456-a5b8-3042d9b0ece9\") " pod="kube-system/kube-proxy-m4475" May 13 00:42:32.176200 kubelet[1939]: I0513 00:42:32.176008 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vshd\" (UniqueName: \"kubernetes.io/projected/e5deb638-8442-4be9-8ef4-3bd6bb82ce53-kube-api-access-2vshd\") pod \"tigera-operator-789496d6f5-n8pt5\" (UID: \"e5deb638-8442-4be9-8ef4-3bd6bb82ce53\") " pod="tigera-operator/tigera-operator-789496d6f5-n8pt5" May 13 00:42:32.282407 kubelet[1939]: I0513 00:42:32.282361 1939 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:42:32.405079 kubelet[1939]: E0513 00:42:32.404952 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:32.427894 kubelet[1939]: E0513 00:42:32.427841 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:32.428613 env[1200]: time="2025-05-13T00:42:32.428562569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-m4475,Uid:ce66d9e3-e374-4456-a5b8-3042d9b0ece9,Namespace:kube-system,Attempt:0,}" May 13 00:42:32.443753 env[1200]: time="2025-05-13T00:42:32.443682767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:32.443753 env[1200]: time="2025-05-13T00:42:32.443729297Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:32.443753 env[1200]: time="2025-05-13T00:42:32.443742983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:32.443943 env[1200]: time="2025-05-13T00:42:32.443902758Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d pid=2034 runtime=io.containerd.runc.v2 May 13 00:42:32.448015 env[1200]: time="2025-05-13T00:42:32.447686535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-n8pt5,Uid:e5deb638-8442-4be9-8ef4-3bd6bb82ce53,Namespace:tigera-operator,Attempt:0,}" May 13 00:42:32.456765 systemd[1]: Started cri-containerd-04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d.scope. May 13 00:42:32.471700 kernel: kauditd_printk_skb: 10 callbacks suppressed May 13 00:42:32.472305 kernel: audit: type=1400 audit(1747096952.466:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.472342 kernel: audit: type=1400 audit(1747096952.466:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.478693 env[1200]: time="2025-05-13T00:42:32.475932853Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:32.478693 env[1200]: time="2025-05-13T00:42:32.475983810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:32.478693 env[1200]: time="2025-05-13T00:42:32.476002135Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:32.478693 env[1200]: time="2025-05-13T00:42:32.476153744Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43d4978715967cbc796ecab29d5810ac281936248de4b11190037bfac330c27a pid=2069 runtime=io.containerd.runc.v2 May 13 00:42:32.480287 kernel: audit: type=1400 audit(1747096952.466:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.480387 kernel: audit: type=1400 audit(1747096952.466:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.483449 kernel: audit: type=1400 audit(1747096952.466:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.489438 kernel: audit: type=1400 audit(1747096952.466:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.492974 kernel: audit: type=1400 audit(1747096952.466:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.492569 systemd[1]: Started cri-containerd-43d4978715967cbc796ecab29d5810ac281936248de4b11190037bfac330c27a.scope. May 13 00:42:32.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.496450 kernel: audit: type=1400 audit(1747096952.466:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.499435 kernel: audit: type=1400 audit(1747096952.466:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit: BPF prog-id=100 op=LOAD May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333639623736653235343839306333386235303066303630356564 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333639623736653235343839306333386235303066303630356564 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.470000 audit: BPF prog-id=101 op=LOAD May 13 00:42:32.470000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002b5120 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333639623736653235343839306333386235303066303630356564 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.503449 kernel: audit: type=1400 audit(1747096952.470:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.474000 audit: BPF prog-id=102 op=LOAD May 13 00:42:32.474000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002b5168 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333639623736653235343839306333386235303066303630356564 May 13 00:42:32.482000 audit: BPF prog-id=102 op=UNLOAD May 13 00:42:32.482000 audit: BPF prog-id=101 op=UNLOAD May 13 00:42:32.482000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.482000 audit: BPF prog-id=103 op=LOAD May 13 00:42:32.482000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002b5578 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333639623736653235343839306333386235303066303630356564 May 13 00:42:32.509343 env[1200]: time="2025-05-13T00:42:32.505938932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-m4475,Uid:ce66d9e3-e374-4456-a5b8-3042d9b0ece9,Namespace:kube-system,Attempt:0,} returns sandbox id \"04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d\"" May 13 00:42:32.509493 kubelet[1939]: E0513 00:42:32.507656 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:32.509731 env[1200]: time="2025-05-13T00:42:32.509685838Z" level=info msg="CreateContainer within sandbox \"04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:42:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.510000 audit: BPF prog-id=104 op=LOAD May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2069 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643439373837313539363763626337393665636162323964353831 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2069 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643439373837313539363763626337393665636162323964353831 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit: BPF prog-id=105 op=LOAD May 13 00:42:32.511000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025390 items=0 ppid=2069 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643439373837313539363763626337393665636162323964353831 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit: BPF prog-id=106 op=LOAD May 13 00:42:32.511000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000253d8 items=0 ppid=2069 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643439373837313539363763626337393665636162323964353831 May 13 00:42:32.511000 audit: BPF prog-id=106 op=UNLOAD May 13 00:42:32.511000 audit: BPF prog-id=105 op=UNLOAD May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.511000 audit: BPF prog-id=107 op=LOAD May 13 00:42:32.511000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000257e8 items=0 ppid=2069 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643439373837313539363763626337393665636162323964353831 May 13 00:42:32.533253 env[1200]: time="2025-05-13T00:42:32.533201852Z" level=info msg="CreateContainer within sandbox \"04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"88eb96728d20c4efb7171769ae42300d3f9555928e1e79a457217471dae07154\"" May 13 00:42:32.533937 env[1200]: time="2025-05-13T00:42:32.533830844Z" level=info msg="StartContainer for \"88eb96728d20c4efb7171769ae42300d3f9555928e1e79a457217471dae07154\"" May 13 00:42:32.535506 env[1200]: time="2025-05-13T00:42:32.535468391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-n8pt5,Uid:e5deb638-8442-4be9-8ef4-3bd6bb82ce53,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"43d4978715967cbc796ecab29d5810ac281936248de4b11190037bfac330c27a\"" May 13 00:42:32.537454 env[1200]: time="2025-05-13T00:42:32.537407093Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:42:32.552525 systemd[1]: Started cri-containerd-88eb96728d20c4efb7171769ae42300d3f9555928e1e79a457217471dae07154.scope. May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f589c170cc8 items=0 ppid=2034 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656239363732386432306334656662373137313736396165343233 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit: BPF prog-id=108 op=LOAD May 13 00:42:32.563000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000304698 items=0 ppid=2034 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656239363732386432306334656662373137313736396165343233 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.563000 audit: BPF prog-id=109 op=LOAD May 13 00:42:32.563000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003046e8 items=0 ppid=2034 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656239363732386432306334656662373137313736396165343233 May 13 00:42:32.563000 audit: BPF prog-id=109 op=UNLOAD May 13 00:42:32.564000 audit: BPF prog-id=108 op=UNLOAD May 13 00:42:32.564000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:32.564000 audit: BPF prog-id=110 op=LOAD May 13 00:42:32.564000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000304778 items=0 ppid=2034 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656239363732386432306334656662373137313736396165343233 May 13 00:42:32.580888 env[1200]: time="2025-05-13T00:42:32.580825890Z" level=info msg="StartContainer for \"88eb96728d20c4efb7171769ae42300d3f9555928e1e79a457217471dae07154\" returns successfully" May 13 00:42:32.684000 audit[2178]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.684000 audit[2177]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.684000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0e116ac0 a2=0 a3=cf8c87f9e2678571 items=0 ppid=2128 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:42:32.684000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc99a9270 a2=0 a3=7ffcc99a925c items=0 ppid=2128 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:42:32.685000 audit[2179]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.685000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7fae9ef0 a2=0 a3=7fff7fae9edc items=0 ppid=2128 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:42:32.686000 audit[2180]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.686000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd0c4a790 a2=0 a3=7fffd0c4a77c items=0 ppid=2128 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:42:32.688000 audit[2183]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.688000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce91b0d90 a2=0 a3=7ffce91b0d7c items=0 ppid=2128 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:42:32.688000 audit[2182]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.688000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe88bd6a00 a2=0 a3=be88cc64b8380bf7 items=0 ppid=2128 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:42:32.753532 kubelet[1939]: E0513 00:42:32.753494 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:32.754332 kubelet[1939]: E0513 00:42:32.754136 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:32.766695 kubelet[1939]: I0513 00:42:32.766647 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-m4475" podStartSLOduration=1.76662977 podStartE2EDuration="1.76662977s" podCreationTimestamp="2025-05-13 00:42:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:42:32.766307544 +0000 UTC m=+9.126179163" watchObservedRunningTime="2025-05-13 00:42:32.76662977 +0000 UTC m=+9.126501379" May 13 00:42:32.786000 audit[2184]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.786000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe3b933680 a2=0 a3=7ffe3b93366c items=0 ppid=2128 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:42:32.788000 audit[2186]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.788000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc38f73e90 a2=0 a3=7ffc38f73e7c items=0 ppid=2128 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:42:32.792000 audit[2189]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.792000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc39327450 a2=0 a3=7ffc3932743c items=0 ppid=2128 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:42:32.792000 audit[2190]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.792000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff76121340 a2=0 a3=7fff7612132c items=0 ppid=2128 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:42:32.794000 audit[2192]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.794000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9292c0a0 a2=0 a3=7ffc9292c08c items=0 ppid=2128 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:42:32.795000 audit[2193]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.795000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4e770d50 a2=0 a3=7ffc4e770d3c items=0 ppid=2128 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:42:32.797000 audit[2195]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.797000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0e487240 a2=0 a3=7fff0e48722c items=0 ppid=2128 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:42:32.800000 audit[2198]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.800000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3886f520 a2=0 a3=7fff3886f50c items=0 ppid=2128 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:42:32.801000 audit[2199]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.801000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd6f9d1f0 a2=0 a3=7ffcd6f9d1dc items=0 ppid=2128 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:42:32.802000 audit[2201]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.802000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8e45da80 a2=0 a3=7ffc8e45da6c items=0 ppid=2128 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:42:32.803000 audit[2202]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.803000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeef8478b0 a2=0 a3=7ffeef84789c items=0 ppid=2128 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:42:32.805000 audit[2204]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.805000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd54195590 a2=0 a3=7ffd5419557c items=0 ppid=2128 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:42:32.808000 audit[2207]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.808000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3eea8000 a2=0 a3=7ffe3eea7fec items=0 ppid=2128 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:42:32.811000 audit[2210]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.811000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff32c34630 a2=0 a3=7fff32c3461c items=0 ppid=2128 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:42:32.812000 audit[2211]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.812000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd73f2c80 a2=0 a3=7ffcd73f2c6c items=0 ppid=2128 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:42:32.813000 audit[2213]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.813000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe5038e420 a2=0 a3=7ffe5038e40c items=0 ppid=2128 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:42:32.816000 audit[2216]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.816000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedee074f0 a2=0 a3=7ffedee074dc items=0 ppid=2128 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:42:32.817000 audit[2217]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.817000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1736fcb0 a2=0 a3=7ffc1736fc9c items=0 ppid=2128 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:42:32.819000 audit[2219]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:42:32.819000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe47addd00 a2=0 a3=7ffe47addcec items=0 ppid=2128 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:42:32.838000 audit[2225]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:32.838000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcbdb886b0 a2=0 a3=7ffcbdb8869c items=0 ppid=2128 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:32.846000 audit[2225]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:32.846000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcbdb886b0 a2=0 a3=7ffcbdb8869c items=0 ppid=2128 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:32.848000 audit[2230]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.848000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff96702e20 a2=0 a3=7fff96702e0c items=0 ppid=2128 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:42:32.850000 audit[2232]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.850000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3e6a7df0 a2=0 a3=7ffd3e6a7ddc items=0 ppid=2128 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:42:32.853000 audit[2235]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.853000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9c0058b0 a2=0 a3=7ffd9c00589c items=0 ppid=2128 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:42:32.853000 audit[2236]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.853000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff101e3dd0 a2=0 a3=7fff101e3dbc items=0 ppid=2128 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:42:32.855000 audit[2238]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.855000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe022a1bb0 a2=0 a3=7ffe022a1b9c items=0 ppid=2128 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:42:32.856000 audit[2239]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.856000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe911700b0 a2=0 a3=7ffe9117009c items=0 ppid=2128 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:42:32.858000 audit[2241]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.858000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff584d1590 a2=0 a3=7fff584d157c items=0 ppid=2128 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:42:32.861000 audit[2244]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.861000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffedd328dc0 a2=0 a3=7ffedd328dac items=0 ppid=2128 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:42:32.862000 audit[2245]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.862000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9ce9fd50 a2=0 a3=7fff9ce9fd3c items=0 ppid=2128 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:42:32.863000 audit[2247]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.863000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff682fede0 a2=0 a3=7fff682fedcc items=0 ppid=2128 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:42:32.864000 audit[2248]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.864000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6a8311c0 a2=0 a3=7ffe6a8311ac items=0 ppid=2128 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.864000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:42:32.866000 audit[2250]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.866000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe74cac1a0 a2=0 a3=7ffe74cac18c items=0 ppid=2128 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:42:32.869000 audit[2253]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.869000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffaef67130 a2=0 a3=7fffaef6711c items=0 ppid=2128 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:42:32.872000 audit[2256]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.872000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea1eadde0 a2=0 a3=7ffea1eaddcc items=0 ppid=2128 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:42:32.873000 audit[2257]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.873000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfaf44630 a2=0 a3=7ffdfaf4461c items=0 ppid=2128 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:42:32.875000 audit[2259]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.875000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc36d587a0 a2=0 a3=7ffc36d5878c items=0 ppid=2128 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:42:32.878000 audit[2262]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.878000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc23cf5260 a2=0 a3=7ffc23cf524c items=0 ppid=2128 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:42:32.879000 audit[2263]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.879000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb7ab8210 a2=0 a3=7ffcb7ab81fc items=0 ppid=2128 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:42:32.880000 audit[2265]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.880000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff11a09cd0 a2=0 a3=7fff11a09cbc items=0 ppid=2128 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:42:32.881000 audit[2266]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.881000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2a7e3dc0 a2=0 a3=7fff2a7e3dac items=0 ppid=2128 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:42:32.883000 audit[2268]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.883000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbd202a80 a2=0 a3=7ffdbd202a6c items=0 ppid=2128 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:42:32.886000 audit[2271]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:42:32.886000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde83d8d40 a2=0 a3=7ffde83d8d2c items=0 ppid=2128 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:42:32.888000 audit[2273]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:42:32.888000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffeb6ad65e0 a2=0 a3=7ffeb6ad65cc items=0 ppid=2128 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.888000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:32.889000 audit[2273]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:42:32.889000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb6ad65e0 a2=0 a3=7ffeb6ad65cc items=0 ppid=2128 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:32.889000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:33.288248 systemd[1]: run-containerd-runc-k8s.io-04369b76e254890c38b500f0605ed820d9d3237d305539a27d9f1cbf8e92793d-runc.ozYIqt.mount: Deactivated successfully. May 13 00:42:33.754817 kubelet[1939]: E0513 00:42:33.754797 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:34.039255 kubelet[1939]: E0513 00:42:34.039138 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:34.756445 kubelet[1939]: E0513 00:42:34.755878 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:35.297130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1213820334.mount: Deactivated successfully. May 13 00:42:36.289117 kubelet[1939]: E0513 00:42:36.286251 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:36.946413 update_engine[1191]: I0513 00:42:36.946327 1191 update_attempter.cc:509] Updating boot flags... May 13 00:42:37.461736 env[1200]: time="2025-05-13T00:42:37.461684041Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:37.463537 env[1200]: time="2025-05-13T00:42:37.463504911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:37.465054 env[1200]: time="2025-05-13T00:42:37.465012626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:37.466498 env[1200]: time="2025-05-13T00:42:37.466466821Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:37.466969 env[1200]: time="2025-05-13T00:42:37.466934980Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 00:42:37.468587 env[1200]: time="2025-05-13T00:42:37.468556221Z" level=info msg="CreateContainer within sandbox \"43d4978715967cbc796ecab29d5810ac281936248de4b11190037bfac330c27a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:42:37.478942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3823251261.mount: Deactivated successfully. May 13 00:42:37.480212 env[1200]: time="2025-05-13T00:42:37.480172979Z" level=info msg="CreateContainer within sandbox \"43d4978715967cbc796ecab29d5810ac281936248de4b11190037bfac330c27a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"510f17127d0a95a448f8e97c014bac7d92a74d43c40144a39d7340b717a44438\"" May 13 00:42:37.480676 env[1200]: time="2025-05-13T00:42:37.480634295Z" level=info msg="StartContainer for \"510f17127d0a95a448f8e97c014bac7d92a74d43c40144a39d7340b717a44438\"" May 13 00:42:37.497979 systemd[1]: run-containerd-runc-k8s.io-510f17127d0a95a448f8e97c014bac7d92a74d43c40144a39d7340b717a44438-runc.OqETYd.mount: Deactivated successfully. May 13 00:42:37.499206 systemd[1]: Started cri-containerd-510f17127d0a95a448f8e97c014bac7d92a74d43c40144a39d7340b717a44438.scope. May 13 00:42:37.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511265 kernel: kauditd_printk_skb: 300 callbacks suppressed May 13 00:42:37.511330 kernel: audit: type=1400 audit(1747096957.507:887): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511359 kernel: audit: type=1400 audit(1747096957.507:888): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516995 kernel: audit: type=1400 audit(1747096957.507:889): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.517044 kernel: audit: type=1400 audit(1747096957.507:890): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522783 kernel: audit: type=1400 audit(1747096957.507:891): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522835 kernel: audit: type=1400 audit(1747096957.507:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.528606 kernel: audit: type=1400 audit(1747096957.507:893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.528683 kernel: audit: type=1400 audit(1747096957.507:894): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.534292 kernel: audit: type=1400 audit(1747096957.507:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.534341 kernel: audit: type=1400 audit(1747096957.510:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.510000 audit: BPF prog-id=111 op=LOAD May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2069 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:37.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306631373132376430613935613434386638653937633031346261 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2069 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:37.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306631373132376430613935613434386638653937633031346261 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.511000 audit: BPF prog-id=112 op=LOAD May 13 00:42:37.511000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca020 items=0 ppid=2069 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:37.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306631373132376430613935613434386638653937633031346261 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.516000 audit: BPF prog-id=113 op=LOAD May 13 00:42:37.516000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca068 items=0 ppid=2069 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:37.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306631373132376430613935613434386638653937633031346261 May 13 00:42:37.522000 audit: BPF prog-id=113 op=UNLOAD May 13 00:42:37.522000 audit: BPF prog-id=112 op=UNLOAD May 13 00:42:37.522000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:37.522000 audit: BPF prog-id=114 op=LOAD May 13 00:42:37.522000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca478 items=0 ppid=2069 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:37.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306631373132376430613935613434386638653937633031346261 May 13 00:42:37.549895 env[1200]: time="2025-05-13T00:42:37.549847364Z" level=info msg="StartContainer for \"510f17127d0a95a448f8e97c014bac7d92a74d43c40144a39d7340b717a44438\" returns successfully" May 13 00:42:41.677000 audit[2333]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:41.677000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc81dd51b0 a2=0 a3=7ffc81dd519c items=0 ppid=2128 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:41.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:41.683000 audit[2333]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:41.683000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc81dd51b0 a2=0 a3=0 items=0 ppid=2128 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:41.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:41.705000 audit[2335]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:41.705000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd51e2e320 a2=0 a3=7ffd51e2e30c items=0 ppid=2128 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:41.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:41.709000 audit[2335]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:41.709000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd51e2e320 a2=0 a3=0 items=0 ppid=2128 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:41.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:41.781120 kubelet[1939]: I0513 00:42:41.781065 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-n8pt5" podStartSLOduration=4.850530419 podStartE2EDuration="9.781046606s" podCreationTimestamp="2025-05-13 00:42:32 +0000 UTC" firstStartedPulling="2025-05-13 00:42:32.537073206 +0000 UTC m=+8.896944815" lastFinishedPulling="2025-05-13 00:42:37.467589383 +0000 UTC m=+13.827461002" observedRunningTime="2025-05-13 00:42:37.921155921 +0000 UTC m=+14.281027560" watchObservedRunningTime="2025-05-13 00:42:41.781046606 +0000 UTC m=+18.140918225" May 13 00:42:41.786581 systemd[1]: Created slice kubepods-besteffort-pod0465603e_38a3_4add_b690_ad93f4bb6889.slice. May 13 00:42:41.791888 systemd[1]: Created slice kubepods-besteffort-podc3b8e1e6_52d9_4bbe_8544_3bdfc48c6f76.slice. May 13 00:42:41.836231 kubelet[1939]: I0513 00:42:41.836194 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-flexvol-driver-host\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836231 kubelet[1939]: I0513 00:42:41.836231 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gxfhn\" (UniqueName: \"kubernetes.io/projected/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-kube-api-access-gxfhn\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836438 kubelet[1939]: I0513 00:42:41.836247 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-policysync\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836438 kubelet[1939]: I0513 00:42:41.836263 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-cni-bin-dir\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836438 kubelet[1939]: I0513 00:42:41.836276 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-tigera-ca-bundle\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836438 kubelet[1939]: I0513 00:42:41.836290 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-node-certs\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836438 kubelet[1939]: I0513 00:42:41.836303 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-xtables-lock\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836618 kubelet[1939]: I0513 00:42:41.836316 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-var-run-calico\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836618 kubelet[1939]: I0513 00:42:41.836328 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-cni-log-dir\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836618 kubelet[1939]: I0513 00:42:41.836346 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0465603e-38a3-4add-b690-ad93f4bb6889-tigera-ca-bundle\") pod \"calico-typha-6bbb8b9f7-46gvz\" (UID: \"0465603e-38a3-4add-b690-ad93f4bb6889\") " pod="calico-system/calico-typha-6bbb8b9f7-46gvz" May 13 00:42:41.836618 kubelet[1939]: I0513 00:42:41.836367 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-var-lib-calico\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836618 kubelet[1939]: I0513 00:42:41.836383 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0465603e-38a3-4add-b690-ad93f4bb6889-typha-certs\") pod \"calico-typha-6bbb8b9f7-46gvz\" (UID: \"0465603e-38a3-4add-b690-ad93f4bb6889\") " pod="calico-system/calico-typha-6bbb8b9f7-46gvz" May 13 00:42:41.836781 kubelet[1939]: I0513 00:42:41.836398 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-cni-net-dir\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.836781 kubelet[1939]: I0513 00:42:41.836413 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sh5vf\" (UniqueName: \"kubernetes.io/projected/0465603e-38a3-4add-b690-ad93f4bb6889-kube-api-access-sh5vf\") pod \"calico-typha-6bbb8b9f7-46gvz\" (UID: \"0465603e-38a3-4add-b690-ad93f4bb6889\") " pod="calico-system/calico-typha-6bbb8b9f7-46gvz" May 13 00:42:41.836781 kubelet[1939]: I0513 00:42:41.836441 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76-lib-modules\") pod \"calico-node-vv9wv\" (UID: \"c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76\") " pod="calico-system/calico-node-vv9wv" May 13 00:42:41.862054 kubelet[1939]: E0513 00:42:41.861996 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:41.937444 kubelet[1939]: I0513 00:42:41.937265 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e567def1-96f2-4f21-9272-da1b9fb80faf-socket-dir\") pod \"csi-node-driver-xcl47\" (UID: \"e567def1-96f2-4f21-9272-da1b9fb80faf\") " pod="calico-system/csi-node-driver-xcl47" May 13 00:42:41.937444 kubelet[1939]: I0513 00:42:41.937320 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e567def1-96f2-4f21-9272-da1b9fb80faf-kubelet-dir\") pod \"csi-node-driver-xcl47\" (UID: \"e567def1-96f2-4f21-9272-da1b9fb80faf\") " pod="calico-system/csi-node-driver-xcl47" May 13 00:42:41.937444 kubelet[1939]: I0513 00:42:41.937376 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e567def1-96f2-4f21-9272-da1b9fb80faf-registration-dir\") pod \"csi-node-driver-xcl47\" (UID: \"e567def1-96f2-4f21-9272-da1b9fb80faf\") " pod="calico-system/csi-node-driver-xcl47" May 13 00:42:41.937671 kubelet[1939]: I0513 00:42:41.937480 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e567def1-96f2-4f21-9272-da1b9fb80faf-varrun\") pod \"csi-node-driver-xcl47\" (UID: \"e567def1-96f2-4f21-9272-da1b9fb80faf\") " pod="calico-system/csi-node-driver-xcl47" May 13 00:42:41.937671 kubelet[1939]: I0513 00:42:41.937605 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wbzcv\" (UniqueName: \"kubernetes.io/projected/e567def1-96f2-4f21-9272-da1b9fb80faf-kube-api-access-wbzcv\") pod \"csi-node-driver-xcl47\" (UID: \"e567def1-96f2-4f21-9272-da1b9fb80faf\") " pod="calico-system/csi-node-driver-xcl47" May 13 00:42:41.938820 kubelet[1939]: E0513 00:42:41.938511 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.938820 kubelet[1939]: W0513 00:42:41.938532 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.938820 kubelet[1939]: E0513 00:42:41.938554 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.938945 kubelet[1939]: E0513 00:42:41.938850 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.938945 kubelet[1939]: W0513 00:42:41.938858 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.938945 kubelet[1939]: E0513 00:42:41.938872 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.939267 kubelet[1939]: E0513 00:42:41.939227 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.939267 kubelet[1939]: W0513 00:42:41.939261 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.939577 kubelet[1939]: E0513 00:42:41.939307 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.939660 kubelet[1939]: E0513 00:42:41.939644 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.939660 kubelet[1939]: W0513 00:42:41.939658 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.939710 kubelet[1939]: E0513 00:42:41.939674 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.939899 kubelet[1939]: E0513 00:42:41.939884 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.939899 kubelet[1939]: W0513 00:42:41.939898 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.940003 kubelet[1939]: E0513 00:42:41.939945 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.943318 kubelet[1939]: E0513 00:42:41.940081 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.943318 kubelet[1939]: W0513 00:42:41.940095 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.943318 kubelet[1939]: E0513 00:42:41.940206 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.943318 kubelet[1939]: E0513 00:42:41.940361 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.943318 kubelet[1939]: W0513 00:42:41.940368 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.943318 kubelet[1939]: E0513 00:42:41.940396 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.944095 kubelet[1939]: E0513 00:42:41.944062 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.944095 kubelet[1939]: W0513 00:42:41.944089 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.944169 kubelet[1939]: E0513 00:42:41.944113 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.945029 kubelet[1939]: E0513 00:42:41.944453 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.945029 kubelet[1939]: W0513 00:42:41.944474 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.945029 kubelet[1939]: E0513 00:42:41.944497 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.945029 kubelet[1939]: E0513 00:42:41.944693 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.945029 kubelet[1939]: W0513 00:42:41.944713 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.945029 kubelet[1939]: E0513 00:42:41.944739 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.949265 kubelet[1939]: E0513 00:42:41.949243 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.949265 kubelet[1939]: W0513 00:42:41.949258 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.949409 kubelet[1939]: E0513 00:42:41.949273 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.949819 kubelet[1939]: E0513 00:42:41.949803 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.949819 kubelet[1939]: W0513 00:42:41.949815 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.949920 kubelet[1939]: E0513 00:42:41.949828 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.949980 kubelet[1939]: E0513 00:42:41.949965 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.949980 kubelet[1939]: W0513 00:42:41.949975 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.949980 kubelet[1939]: E0513 00:42:41.949982 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.955723 kubelet[1939]: E0513 00:42:41.955695 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.955723 kubelet[1939]: W0513 00:42:41.955712 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.955816 kubelet[1939]: E0513 00:42:41.955730 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:41.955922 kubelet[1939]: E0513 00:42:41.955905 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:41.955922 kubelet[1939]: W0513 00:42:41.955917 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:41.955992 kubelet[1939]: E0513 00:42:41.955926 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.038120 kubelet[1939]: E0513 00:42:42.038089 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.038120 kubelet[1939]: W0513 00:42:42.038110 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.038276 kubelet[1939]: E0513 00:42:42.038131 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.038400 kubelet[1939]: E0513 00:42:42.038384 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.038400 kubelet[1939]: W0513 00:42:42.038397 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.038504 kubelet[1939]: E0513 00:42:42.038411 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.038624 kubelet[1939]: E0513 00:42:42.038612 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.038624 kubelet[1939]: W0513 00:42:42.038621 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.038709 kubelet[1939]: E0513 00:42:42.038633 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.038908 kubelet[1939]: E0513 00:42:42.038879 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.038963 kubelet[1939]: W0513 00:42:42.038908 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.038963 kubelet[1939]: E0513 00:42:42.038932 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.039099 kubelet[1939]: E0513 00:42:42.039082 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.039099 kubelet[1939]: W0513 00:42:42.039096 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.039175 kubelet[1939]: E0513 00:42:42.039109 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.039274 kubelet[1939]: E0513 00:42:42.039261 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.039274 kubelet[1939]: W0513 00:42:42.039270 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.039342 kubelet[1939]: E0513 00:42:42.039282 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.039544 kubelet[1939]: E0513 00:42:42.039498 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.039544 kubelet[1939]: W0513 00:42:42.039520 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.039544 kubelet[1939]: E0513 00:42:42.039533 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.039726 kubelet[1939]: E0513 00:42:42.039712 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.039726 kubelet[1939]: W0513 00:42:42.039723 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.039814 kubelet[1939]: E0513 00:42:42.039737 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.039908 kubelet[1939]: E0513 00:42:42.039898 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.039908 kubelet[1939]: W0513 00:42:42.039906 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.040016 kubelet[1939]: E0513 00:42:42.039929 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.040086 kubelet[1939]: E0513 00:42:42.040069 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.040086 kubelet[1939]: W0513 00:42:42.040079 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.040152 kubelet[1939]: E0513 00:42:42.040118 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.040295 kubelet[1939]: E0513 00:42:42.040271 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.040295 kubelet[1939]: W0513 00:42:42.040289 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.040508 kubelet[1939]: E0513 00:42:42.040330 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.040508 kubelet[1939]: E0513 00:42:42.040490 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.040508 kubelet[1939]: W0513 00:42:42.040499 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.040593 kubelet[1939]: E0513 00:42:42.040512 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.040758 kubelet[1939]: E0513 00:42:42.040735 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.040758 kubelet[1939]: W0513 00:42:42.040748 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.040809 kubelet[1939]: E0513 00:42:42.040761 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.040964 kubelet[1939]: E0513 00:42:42.040948 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.040964 kubelet[1939]: W0513 00:42:42.040960 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.041035 kubelet[1939]: E0513 00:42:42.040973 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.041167 kubelet[1939]: E0513 00:42:42.041155 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.041167 kubelet[1939]: W0513 00:42:42.041166 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.041244 kubelet[1939]: E0513 00:42:42.041179 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.041389 kubelet[1939]: E0513 00:42:42.041377 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.041389 kubelet[1939]: W0513 00:42:42.041387 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.041467 kubelet[1939]: E0513 00:42:42.041399 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.041591 kubelet[1939]: E0513 00:42:42.041580 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.041591 kubelet[1939]: W0513 00:42:42.041589 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.041659 kubelet[1939]: E0513 00:42:42.041647 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.041767 kubelet[1939]: E0513 00:42:42.041757 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.041767 kubelet[1939]: W0513 00:42:42.041765 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.041852 kubelet[1939]: E0513 00:42:42.041811 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.041977 kubelet[1939]: E0513 00:42:42.041965 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.041977 kubelet[1939]: W0513 00:42:42.041973 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.042046 kubelet[1939]: E0513 00:42:42.041993 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.042170 kubelet[1939]: E0513 00:42:42.042157 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.042170 kubelet[1939]: W0513 00:42:42.042166 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.042255 kubelet[1939]: E0513 00:42:42.042180 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.043245 kubelet[1939]: E0513 00:42:42.043223 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.043245 kubelet[1939]: W0513 00:42:42.043236 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.043321 kubelet[1939]: E0513 00:42:42.043264 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.043528 kubelet[1939]: E0513 00:42:42.043515 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.043528 kubelet[1939]: W0513 00:42:42.043528 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.043604 kubelet[1939]: E0513 00:42:42.043562 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.043689 kubelet[1939]: E0513 00:42:42.043677 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.043761 kubelet[1939]: W0513 00:42:42.043746 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.043931 kubelet[1939]: E0513 00:42:42.043904 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.044103 kubelet[1939]: E0513 00:42:42.044089 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.044103 kubelet[1939]: W0513 00:42:42.044099 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.044223 kubelet[1939]: E0513 00:42:42.044113 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.044334 kubelet[1939]: E0513 00:42:42.044319 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.044334 kubelet[1939]: W0513 00:42:42.044328 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.044334 kubelet[1939]: E0513 00:42:42.044336 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.051039 kubelet[1939]: E0513 00:42:42.051014 1939 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:42:42.051201 kubelet[1939]: W0513 00:42:42.051181 1939 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:42:42.051284 kubelet[1939]: E0513 00:42:42.051265 1939 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:42:42.090276 kubelet[1939]: E0513 00:42:42.090232 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:42.090809 env[1200]: time="2025-05-13T00:42:42.090755680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bbb8b9f7-46gvz,Uid:0465603e-38a3-4add-b690-ad93f4bb6889,Namespace:calico-system,Attempt:0,}" May 13 00:42:42.093715 kubelet[1939]: E0513 00:42:42.093693 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:42.094124 env[1200]: time="2025-05-13T00:42:42.094090445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vv9wv,Uid:c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76,Namespace:calico-system,Attempt:0,}" May 13 00:42:42.107002 env[1200]: time="2025-05-13T00:42:42.106947862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:42.107173 env[1200]: time="2025-05-13T00:42:42.106980634Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:42.107173 env[1200]: time="2025-05-13T00:42:42.106990323Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:42.107173 env[1200]: time="2025-05-13T00:42:42.107069462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8c6bb9628125df6b61c82d47f07c34416994d2347775cd0efb04c11b66370eb pid=2390 runtime=io.containerd.runc.v2 May 13 00:42:42.111683 env[1200]: time="2025-05-13T00:42:42.111632052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:42:42.111799 env[1200]: time="2025-05-13T00:42:42.111668321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:42:42.111799 env[1200]: time="2025-05-13T00:42:42.111677849Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:42:42.111888 env[1200]: time="2025-05-13T00:42:42.111813826Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85 pid=2412 runtime=io.containerd.runc.v2 May 13 00:42:42.116580 systemd[1]: Started cri-containerd-e8c6bb9628125df6b61c82d47f07c34416994d2347775cd0efb04c11b66370eb.scope. May 13 00:42:42.125214 systemd[1]: Started cri-containerd-c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85.scope. May 13 00:42:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.132000 audit: BPF prog-id=115 op=LOAD May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2390 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633662623936323831323564663662363163383264343766303763 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2390 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633662623936323831323564663662363163383264343766303763 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit: BPF prog-id=116 op=LOAD May 13 00:42:42.133000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000301320 items=0 ppid=2390 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633662623936323831323564663662363163383264343766303763 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit: BPF prog-id=117 op=LOAD May 13 00:42:42.133000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000301368 items=0 ppid=2390 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633662623936323831323564663662363163383264343766303763 May 13 00:42:42.133000 audit: BPF prog-id=117 op=UNLOAD May 13 00:42:42.133000 audit: BPF prog-id=116 op=UNLOAD May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit: BPF prog-id=118 op=LOAD May 13 00:42:42.133000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.133000 audit: BPF prog-id=119 op=LOAD May 13 00:42:42.133000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000301778 items=0 ppid=2390 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633662623936323831323564663662363163383264343766303763 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2412 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335656636313965313165376430343765643938366639613061646361 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2412 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335656636313965313165376430343765643938366639613061646361 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit: BPF prog-id=120 op=LOAD May 13 00:42:42.135000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024550 items=0 ppid=2412 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335656636313965313165376430343765643938366639613061646361 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit: BPF prog-id=121 op=LOAD May 13 00:42:42.135000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024598 items=0 ppid=2412 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335656636313965313165376430343765643938366639613061646361 May 13 00:42:42.135000 audit: BPF prog-id=121 op=UNLOAD May 13 00:42:42.135000 audit: BPF prog-id=120 op=UNLOAD May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:42.135000 audit: BPF prog-id=122 op=LOAD May 13 00:42:42.135000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000249a8 items=0 ppid=2412 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335656636313965313165376430343765643938366639613061646361 May 13 00:42:42.145054 env[1200]: time="2025-05-13T00:42:42.145017944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vv9wv,Uid:c3b8e1e6-52d9-4bbe-8544-3bdfc48c6f76,Namespace:calico-system,Attempt:0,} returns sandbox id \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\"" May 13 00:42:42.146275 kubelet[1939]: E0513 00:42:42.145815 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:42.148074 env[1200]: time="2025-05-13T00:42:42.148020920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:42:42.161689 env[1200]: time="2025-05-13T00:42:42.161650851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bbb8b9f7-46gvz,Uid:0465603e-38a3-4add-b690-ad93f4bb6889,Namespace:calico-system,Attempt:0,} returns sandbox id \"e8c6bb9628125df6b61c82d47f07c34416994d2347775cd0efb04c11b66370eb\"" May 13 00:42:42.162443 kubelet[1939]: E0513 00:42:42.162402 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:42.721000 audit[2462]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:42.723457 kernel: kauditd_printk_skb: 173 callbacks suppressed May 13 00:42:42.723520 kernel: audit: type=1325 audit(1747096962.721:945): table=filter:93 family=2 entries=18 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:42.721000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc2155b140 a2=0 a3=7ffc2155b12c items=0 ppid=2128 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.731445 kernel: audit: type=1300 audit(1747096962.721:945): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc2155b140 a2=0 a3=7ffc2155b12c items=0 ppid=2128 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.731490 kernel: audit: type=1327 audit(1747096962.721:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:42.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:42.739000 audit[2462]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:42.739000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2155b140 a2=0 a3=0 items=0 ppid=2128 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.747349 kernel: audit: type=1325 audit(1747096962.739:946): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:42.747408 kernel: audit: type=1300 audit(1747096962.739:946): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2155b140 a2=0 a3=0 items=0 ppid=2128 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:42.747459 kernel: audit: type=1327 audit(1747096962.739:946): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:42.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:43.722619 kubelet[1939]: E0513 00:42:43.722564 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:44.459067 env[1200]: time="2025-05-13T00:42:44.459008962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:44.461039 env[1200]: time="2025-05-13T00:42:44.460980111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:44.462575 env[1200]: time="2025-05-13T00:42:44.462541695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:44.463982 env[1200]: time="2025-05-13T00:42:44.463947313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:44.464434 env[1200]: time="2025-05-13T00:42:44.464372036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:42:44.465513 env[1200]: time="2025-05-13T00:42:44.465335719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:42:44.466302 env[1200]: time="2025-05-13T00:42:44.466242705Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:42:44.480410 env[1200]: time="2025-05-13T00:42:44.480354397Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd\"" May 13 00:42:44.480790 env[1200]: time="2025-05-13T00:42:44.480749454Z" level=info msg="StartContainer for \"dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd\"" May 13 00:42:44.505576 systemd[1]: Started cri-containerd-dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd.scope. May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f75f43de8e8 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:44.524811 kernel: audit: type=1400 audit(1747096964.516:947): avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524904 kernel: audit: type=1300 audit(1747096964.516:947): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f75f43de8e8 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:44.524939 kernel: audit: type=1327 audit(1747096964.516:947): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623864646638353065343630366138383733643861623465666631 May 13 00:42:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623864646638353065343630366138383733643861623465666631 May 13 00:42:44.529044 kernel: audit: type=1400 audit(1747096964.516:948): avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.516000 audit: BPF prog-id=123 op=LOAD May 13 00:42:44.516000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dbd8 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623864646638353065343630366138383733643861623465666631 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.524000 audit: BPF prog-id=124 op=LOAD May 13 00:42:44.524000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dc28 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:44.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623864646638353065343630366138383733643861623465666631 May 13 00:42:44.531000 audit: BPF prog-id=124 op=UNLOAD May 13 00:42:44.531000 audit: BPF prog-id=123 op=UNLOAD May 13 00:42:44.531000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:44.531000 audit: BPF prog-id=125 op=LOAD May 13 00:42:44.531000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032dcb8 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:44.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623864646638353065343630366138383733643861623465666631 May 13 00:42:44.555016 systemd[1]: cri-containerd-dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd.scope: Deactivated successfully. May 13 00:42:44.558000 audit: BPF prog-id=125 op=UNLOAD May 13 00:42:44.574789 env[1200]: time="2025-05-13T00:42:44.574743883Z" level=info msg="StartContainer for \"dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd\" returns successfully" May 13 00:42:44.590502 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd-rootfs.mount: Deactivated successfully. May 13 00:42:44.615148 env[1200]: time="2025-05-13T00:42:44.615078775Z" level=info msg="shim disconnected" id=dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd May 13 00:42:44.615148 env[1200]: time="2025-05-13T00:42:44.615142065Z" level=warning msg="cleaning up after shim disconnected" id=dcb8ddf850e4606a8873d8ab4eff12de1be5be70a9bdfffa5ccf44110d5c1dbd namespace=k8s.io May 13 00:42:44.615148 env[1200]: time="2025-05-13T00:42:44.615154378Z" level=info msg="cleaning up dead shim" May 13 00:42:44.624526 env[1200]: time="2025-05-13T00:42:44.624458446Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:42:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2508 runtime=io.containerd.runc.v2\n" May 13 00:42:44.774307 kubelet[1939]: E0513 00:42:44.774269 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:45.722290 kubelet[1939]: E0513 00:42:45.722225 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:47.722513 kubelet[1939]: E0513 00:42:47.722451 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:48.090067 env[1200]: time="2025-05-13T00:42:48.089982539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:48.094911 env[1200]: time="2025-05-13T00:42:48.094866398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:48.099373 env[1200]: time="2025-05-13T00:42:48.099332029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:48.101089 env[1200]: time="2025-05-13T00:42:48.101052588Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:48.101568 env[1200]: time="2025-05-13T00:42:48.101540118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 00:42:48.102704 env[1200]: time="2025-05-13T00:42:48.102657727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:42:48.111807 env[1200]: time="2025-05-13T00:42:48.111758469Z" level=info msg="CreateContainer within sandbox \"e8c6bb9628125df6b61c82d47f07c34416994d2347775cd0efb04c11b66370eb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:42:48.127107 env[1200]: time="2025-05-13T00:42:48.127063112Z" level=info msg="CreateContainer within sandbox \"e8c6bb9628125df6b61c82d47f07c34416994d2347775cd0efb04c11b66370eb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2c88dde5e2290e29c4cc8aac94a49ccc99a30a6ac57a9032da11c2c176e5d265\"" May 13 00:42:48.127595 env[1200]: time="2025-05-13T00:42:48.127567755Z" level=info msg="StartContainer for \"2c88dde5e2290e29c4cc8aac94a49ccc99a30a6ac57a9032da11c2c176e5d265\"" May 13 00:42:48.141904 systemd[1]: Started cri-containerd-2c88dde5e2290e29c4cc8aac94a49ccc99a30a6ac57a9032da11c2c176e5d265.scope. May 13 00:42:48.166649 kernel: kauditd_printk_skb: 40 callbacks suppressed May 13 00:42:48.166807 kernel: audit: type=1400 audit(1747096968.155:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166837 kernel: audit: type=1400 audit(1747096968.155:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166853 kernel: audit: type=1400 audit(1747096968.155:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.170338 kernel: audit: type=1400 audit(1747096968.155:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.170409 kernel: audit: type=1400 audit(1747096968.155:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.176930 kernel: audit: type=1400 audit(1747096968.155:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.176972 kernel: audit: type=1400 audit(1747096968.155:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.180314 kernel: audit: type=1400 audit(1747096968.155:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.186735 kernel: audit: type=1400 audit(1747096968.155:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.186784 kernel: audit: type=1400 audit(1747096968.159:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.159000 audit: BPF prog-id=126 op=LOAD May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2390 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:48.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383864646535653232393065323963346363386161633934613439 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2390 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:48.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383864646535653232393065323963346363386161633934613439 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.160000 audit: BPF prog-id=127 op=LOAD May 13 00:42:48.160000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ee40 items=0 ppid=2390 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:48.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383864646535653232393065323963346363386161633934613439 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.163000 audit: BPF prog-id=128 op=LOAD May 13 00:42:48.163000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ee88 items=0 ppid=2390 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:48.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383864646535653232393065323963346363386161633934613439 May 13 00:42:48.166000 audit: BPF prog-id=128 op=UNLOAD May 13 00:42:48.166000 audit: BPF prog-id=127 op=UNLOAD May 13 00:42:48.166000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:48.166000 audit: BPF prog-id=129 op=LOAD May 13 00:42:48.166000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f298 items=0 ppid=2390 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:48.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383864646535653232393065323963346363386161633934613439 May 13 00:42:48.207221 env[1200]: time="2025-05-13T00:42:48.202295753Z" level=info msg="StartContainer for \"2c88dde5e2290e29c4cc8aac94a49ccc99a30a6ac57a9032da11c2c176e5d265\" returns successfully" May 13 00:42:48.781963 kubelet[1939]: E0513 00:42:48.781935 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:49.723031 kubelet[1939]: E0513 00:42:49.722987 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:49.782671 kubelet[1939]: I0513 00:42:49.782646 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:42:49.782994 kubelet[1939]: E0513 00:42:49.782892 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:51.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.65:22-10.0.0.1:41860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:51.114533 systemd[1]: Started sshd@7-10.0.0.65:22-10.0.0.1:41860.service. May 13 00:42:51.150000 audit[2567]: USER_ACCT pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.151340 sshd[2567]: Accepted publickey for core from 10.0.0.1 port 41860 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:42:51.151000 audit[2567]: CRED_ACQ pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.151000 audit[2567]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8e38b900 a2=3 a3=0 items=0 ppid=1 pid=2567 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:51.151000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:42:51.152683 sshd[2567]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:42:51.156764 systemd-logind[1189]: New session 8 of user core. May 13 00:42:51.157715 systemd[1]: Started session-8.scope. May 13 00:42:51.162000 audit[2567]: USER_START pid=2567 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.163000 audit[2569]: CRED_ACQ pid=2569 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.282608 sshd[2567]: pam_unix(sshd:session): session closed for user core May 13 00:42:51.283000 audit[2567]: USER_END pid=2567 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.283000 audit[2567]: CRED_DISP pid=2567 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:51.285066 systemd[1]: sshd@7-10.0.0.65:22-10.0.0.1:41860.service: Deactivated successfully. May 13 00:42:51.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.65:22-10.0.0.1:41860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:51.285731 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:42:51.286349 systemd-logind[1189]: Session 8 logged out. Waiting for processes to exit. May 13 00:42:51.287125 systemd-logind[1189]: Removed session 8. May 13 00:42:51.722505 kubelet[1939]: E0513 00:42:51.722452 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:53.723703 kubelet[1939]: E0513 00:42:53.722974 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:55.090963 kubelet[1939]: I0513 00:42:55.090926 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:42:55.091556 kubelet[1939]: E0513 00:42:55.091188 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:55.110267 kubelet[1939]: I0513 00:42:55.110198 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6bbb8b9f7-46gvz" podStartSLOduration=8.171178105 podStartE2EDuration="14.110182311s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:42:42.163366029 +0000 UTC m=+18.523237648" lastFinishedPulling="2025-05-13 00:42:48.102370235 +0000 UTC m=+24.462241854" observedRunningTime="2025-05-13 00:42:48.791766071 +0000 UTC m=+25.151637690" watchObservedRunningTime="2025-05-13 00:42:55.110182311 +0000 UTC m=+31.470053930" May 13 00:42:55.127558 env[1200]: time="2025-05-13T00:42:55.127512702Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:55.130174 env[1200]: time="2025-05-13T00:42:55.130142916Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:55.132211 env[1200]: time="2025-05-13T00:42:55.132176176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:55.133999 env[1200]: time="2025-05-13T00:42:55.133972649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:42:55.134526 env[1200]: time="2025-05-13T00:42:55.134496176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:42:55.136921 env[1200]: time="2025-05-13T00:42:55.136871539Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:42:55.160637 kernel: kauditd_printk_skb: 58 callbacks suppressed May 13 00:42:55.160767 kernel: audit: type=1325 audit(1747096975.156:981): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.156000 audit[2587]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.156000 audit[2587]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd61bc6f40 a2=0 a3=7ffd61bc6f2c items=0 ppid=2128 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.166068 kernel: audit: type=1300 audit(1747096975.156:981): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd61bc6f40 a2=0 a3=7ffd61bc6f2c items=0 ppid=2128 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.168624 kernel: audit: type=1327 audit(1747096975.156:981): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.170000 audit[2587]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.173584 env[1200]: time="2025-05-13T00:42:55.173533631Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3\"" May 13 00:42:55.170000 audit[2587]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd61bc6f40 a2=0 a3=7ffd61bc6f2c items=0 ppid=2128 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.174066 env[1200]: time="2025-05-13T00:42:55.174022492Z" level=info msg="StartContainer for \"439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3\"" May 13 00:42:55.181652 kernel: audit: type=1325 audit(1747096975.170:982): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.181722 kernel: audit: type=1300 audit(1747096975.170:982): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd61bc6f40 a2=0 a3=7ffd61bc6f2c items=0 ppid=2128 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.181744 kernel: audit: type=1327 audit(1747096975.170:982): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.186000 audit[2601]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.186000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcef266e90 a2=0 a3=7ffcef266e7c items=0 ppid=2128 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.195072 kernel: audit: type=1325 audit(1747096975.186:983): table=filter:97 family=2 entries=17 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.195159 kernel: audit: type=1300 audit(1747096975.186:983): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcef266e90 a2=0 a3=7ffcef266e7c items=0 ppid=2128 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.198652 kernel: audit: type=1327 audit(1747096975.186:983): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.199364 systemd[1]: Started cri-containerd-439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3.scope. May 13 00:42:55.199000 audit[2601]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.203475 kernel: audit: type=1325 audit(1747096975.199:984): table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:55.199000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7ffcef266e90 a2=0 a3=0 items=0 ppid=2128 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:55.216000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.216000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0dfc5c22f8 items=0 ppid=2412 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433396330383936323034656664663437666533386135313836323834 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit: BPF prog-id=130 op=LOAD May 13 00:42:55.217000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000256d8 items=0 ppid=2412 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433396330383936323034656664663437666533386135313836323834 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.217000 audit: BPF prog-id=131 op=LOAD May 13 00:42:55.217000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025728 items=0 ppid=2412 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433396330383936323034656664663437666533386135313836323834 May 13 00:42:55.218000 audit: BPF prog-id=131 op=UNLOAD May 13 00:42:55.218000 audit: BPF prog-id=130 op=UNLOAD May 13 00:42:55.218000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:42:55.218000 audit: BPF prog-id=132 op=LOAD May 13 00:42:55.218000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000257b8 items=0 ppid=2412 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:55.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433396330383936323034656664663437666533386135313836323834 May 13 00:42:55.438954 env[1200]: time="2025-05-13T00:42:55.436910091Z" level=info msg="StartContainer for \"439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3\" returns successfully" May 13 00:42:55.722965 kubelet[1939]: E0513 00:42:55.722828 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:55.795342 kubelet[1939]: E0513 00:42:55.795300 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:55.795525 kubelet[1939]: E0513 00:42:55.795509 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:56.131000 audit[2625]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=2625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:56.131000 audit[2625]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1d6c6c50 a2=0 a3=7ffe1d6c6c3c items=0 ppid=2128 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:56.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:56.138000 audit[2625]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:42:56.138000 audit[2625]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1d6c6c50 a2=0 a3=7ffe1d6c6c3c items=0 ppid=2128 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:56.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:42:56.160771 systemd[1]: run-containerd-runc-k8s.io-439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3-runc.WlzgIA.mount: Deactivated successfully. May 13 00:42:56.287108 systemd[1]: Started sshd@8-10.0.0.65:22-10.0.0.1:33056.service. May 13 00:42:56.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.65:22-10.0.0.1:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:56.348000 audit[2628]: USER_ACCT pid=2628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:56.348849 sshd[2628]: Accepted publickey for core from 10.0.0.1 port 33056 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:42:56.349000 audit[2628]: CRED_ACQ pid=2628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:56.349000 audit[2628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18a90190 a2=3 a3=0 items=0 ppid=1 pid=2628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:42:56.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:42:56.349949 sshd[2628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:42:56.944051 systemd-logind[1189]: New session 9 of user core. May 13 00:42:56.944537 kubelet[1939]: E0513 00:42:56.944242 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:56.945042 systemd[1]: Started session-9.scope. May 13 00:42:56.948000 audit[2628]: USER_START pid=2628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:56.949000 audit[2630]: CRED_ACQ pid=2630 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:57.092313 sshd[2628]: pam_unix(sshd:session): session closed for user core May 13 00:42:57.092000 audit[2628]: USER_END pid=2628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:57.092000 audit[2628]: CRED_DISP pid=2628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:42:57.094526 systemd[1]: sshd@8-10.0.0.65:22-10.0.0.1:33056.service: Deactivated successfully. May 13 00:42:57.095168 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:42:57.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.65:22-10.0.0.1:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.095658 systemd-logind[1189]: Session 9 logged out. Waiting for processes to exit. May 13 00:42:57.096347 systemd-logind[1189]: Removed session 9. May 13 00:42:57.150353 env[1200]: time="2025-05-13T00:42:57.150284180Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:42:57.152301 systemd[1]: cri-containerd-439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3.scope: Deactivated successfully. May 13 00:42:57.157000 audit: BPF prog-id=132 op=UNLOAD May 13 00:42:57.168965 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3-rootfs.mount: Deactivated successfully. May 13 00:42:57.176898 env[1200]: time="2025-05-13T00:42:57.176850481Z" level=info msg="shim disconnected" id=439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3 May 13 00:42:57.177013 env[1200]: time="2025-05-13T00:42:57.176902599Z" level=warning msg="cleaning up after shim disconnected" id=439c0896204efdf47fe38a5186284b7c50664ed6f4a6af0231e601a51b0381f3 namespace=k8s.io May 13 00:42:57.177013 env[1200]: time="2025-05-13T00:42:57.176914661Z" level=info msg="cleaning up dead shim" May 13 00:42:57.182723 env[1200]: time="2025-05-13T00:42:57.182682390Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:42:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2654 runtime=io.containerd.runc.v2\n" May 13 00:42:57.208131 kubelet[1939]: I0513 00:42:57.208012 1939 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 13 00:42:57.285427 systemd[1]: Created slice kubepods-burstable-pod4eec60e7_c4b0_4219_aef2_0fcb74419d40.slice. May 13 00:42:57.285900 kubelet[1939]: I0513 00:42:57.285861 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gs464\" (UniqueName: \"kubernetes.io/projected/4eec60e7-c4b0-4219-aef2-0fcb74419d40-kube-api-access-gs464\") pod \"coredns-668d6bf9bc-4dq6p\" (UID: \"4eec60e7-c4b0-4219-aef2-0fcb74419d40\") " pod="kube-system/coredns-668d6bf9bc-4dq6p" May 13 00:42:57.285982 kubelet[1939]: I0513 00:42:57.285914 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4eec60e7-c4b0-4219-aef2-0fcb74419d40-config-volume\") pod \"coredns-668d6bf9bc-4dq6p\" (UID: \"4eec60e7-c4b0-4219-aef2-0fcb74419d40\") " pod="kube-system/coredns-668d6bf9bc-4dq6p" May 13 00:42:57.301167 systemd[1]: Created slice kubepods-burstable-pod6fddd02c_1fa4_43a2_8ef4_f392621d04a3.slice. May 13 00:42:57.305279 systemd[1]: Created slice kubepods-besteffort-podab9bc083_4c3d_4292_b3b3_19dedcfac5d7.slice. May 13 00:42:57.308805 systemd[1]: Created slice kubepods-besteffort-pod7b7c1ec1_9bea_4c58_a518_f3def3a292d1.slice. May 13 00:42:57.313557 systemd[1]: Created slice kubepods-besteffort-pod9786ed1e_5caa_4eec_97c3_22894c003af9.slice. May 13 00:42:57.386511 kubelet[1939]: I0513 00:42:57.386445 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6dc9x\" (UniqueName: \"kubernetes.io/projected/7b7c1ec1-9bea-4c58-a518-f3def3a292d1-kube-api-access-6dc9x\") pod \"calico-kube-controllers-5456bdc8dd-hs2rm\" (UID: \"7b7c1ec1-9bea-4c58-a518-f3def3a292d1\") " pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" May 13 00:42:57.386511 kubelet[1939]: I0513 00:42:57.386499 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tc5n4\" (UniqueName: \"kubernetes.io/projected/ab9bc083-4c3d-4292-b3b3-19dedcfac5d7-kube-api-access-tc5n4\") pod \"calico-apiserver-5bb6dfd48b-xqg2g\" (UID: \"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7\") " pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" May 13 00:42:57.386729 kubelet[1939]: I0513 00:42:57.386573 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7b7c1ec1-9bea-4c58-a518-f3def3a292d1-tigera-ca-bundle\") pod \"calico-kube-controllers-5456bdc8dd-hs2rm\" (UID: \"7b7c1ec1-9bea-4c58-a518-f3def3a292d1\") " pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" May 13 00:42:57.386772 kubelet[1939]: I0513 00:42:57.386726 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6fddd02c-1fa4-43a2-8ef4-f392621d04a3-config-volume\") pod \"coredns-668d6bf9bc-d76zx\" (UID: \"6fddd02c-1fa4-43a2-8ef4-f392621d04a3\") " pod="kube-system/coredns-668d6bf9bc-d76zx" May 13 00:42:57.386772 kubelet[1939]: I0513 00:42:57.386747 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hw55x\" (UniqueName: \"kubernetes.io/projected/9786ed1e-5caa-4eec-97c3-22894c003af9-kube-api-access-hw55x\") pod \"calico-apiserver-5bb6dfd48b-bj9md\" (UID: \"9786ed1e-5caa-4eec-97c3-22894c003af9\") " pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" May 13 00:42:57.386842 kubelet[1939]: I0513 00:42:57.386779 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-22bq2\" (UniqueName: \"kubernetes.io/projected/6fddd02c-1fa4-43a2-8ef4-f392621d04a3-kube-api-access-22bq2\") pod \"coredns-668d6bf9bc-d76zx\" (UID: \"6fddd02c-1fa4-43a2-8ef4-f392621d04a3\") " pod="kube-system/coredns-668d6bf9bc-d76zx" May 13 00:42:57.386842 kubelet[1939]: I0513 00:42:57.386791 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9786ed1e-5caa-4eec-97c3-22894c003af9-calico-apiserver-certs\") pod \"calico-apiserver-5bb6dfd48b-bj9md\" (UID: \"9786ed1e-5caa-4eec-97c3-22894c003af9\") " pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" May 13 00:42:57.386842 kubelet[1939]: I0513 00:42:57.386806 1939 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ab9bc083-4c3d-4292-b3b3-19dedcfac5d7-calico-apiserver-certs\") pod \"calico-apiserver-5bb6dfd48b-xqg2g\" (UID: \"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7\") " pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" May 13 00:42:57.587268 kubelet[1939]: E0513 00:42:57.587220 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:57.588831 env[1200]: time="2025-05-13T00:42:57.588792764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-4dq6p,Uid:4eec60e7-c4b0-4219-aef2-0fcb74419d40,Namespace:kube-system,Attempt:0,}" May 13 00:42:57.604041 kubelet[1939]: E0513 00:42:57.604019 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:57.604464 env[1200]: time="2025-05-13T00:42:57.604434750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d76zx,Uid:6fddd02c-1fa4-43a2-8ef4-f392621d04a3,Namespace:kube-system,Attempt:0,}" May 13 00:42:57.607851 env[1200]: time="2025-05-13T00:42:57.607820524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-xqg2g,Uid:ab9bc083-4c3d-4292-b3b3-19dedcfac5d7,Namespace:calico-apiserver,Attempt:0,}" May 13 00:42:57.612725 env[1200]: time="2025-05-13T00:42:57.612691964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5456bdc8dd-hs2rm,Uid:7b7c1ec1-9bea-4c58-a518-f3def3a292d1,Namespace:calico-system,Attempt:0,}" May 13 00:42:57.616529 env[1200]: time="2025-05-13T00:42:57.616509922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-bj9md,Uid:9786ed1e-5caa-4eec-97c3-22894c003af9,Namespace:calico-apiserver,Attempt:0,}" May 13 00:42:57.726557 systemd[1]: Created slice kubepods-besteffort-pode567def1_96f2_4f21_9272_da1b9fb80faf.slice. May 13 00:42:57.728266 env[1200]: time="2025-05-13T00:42:57.728230970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xcl47,Uid:e567def1-96f2-4f21-9272-da1b9fb80faf,Namespace:calico-system,Attempt:0,}" May 13 00:42:57.947689 kubelet[1939]: E0513 00:42:57.947510 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:42:57.948562 env[1200]: time="2025-05-13T00:42:57.948532222Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:42:58.191697 env[1200]: time="2025-05-13T00:42:58.191611996Z" level=error msg="Failed to destroy network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.196971 env[1200]: time="2025-05-13T00:42:58.191992202Z" level=error msg="encountered an error cleaning up failed sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.196971 env[1200]: time="2025-05-13T00:42:58.192051874Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-xqg2g,Uid:ab9bc083-4c3d-4292-b3b3-19dedcfac5d7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.193822 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128-shm.mount: Deactivated successfully. May 13 00:42:58.197213 kubelet[1939]: E0513 00:42:58.192312 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.197213 kubelet[1939]: E0513 00:42:58.192370 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" May 13 00:42:58.197213 kubelet[1939]: E0513 00:42:58.192391 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" May 13 00:42:58.197357 kubelet[1939]: E0513 00:42:58.192976 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5bb6dfd48b-xqg2g_calico-apiserver(ab9bc083-4c3d-4292-b3b3-19dedcfac5d7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5bb6dfd48b-xqg2g_calico-apiserver(ab9bc083-4c3d-4292-b3b3-19dedcfac5d7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" podUID="ab9bc083-4c3d-4292-b3b3-19dedcfac5d7" May 13 00:42:58.224585 env[1200]: time="2025-05-13T00:42:58.224441224Z" level=error msg="Failed to destroy network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.227282 env[1200]: time="2025-05-13T00:42:58.227227788Z" level=error msg="Failed to destroy network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.229272 env[1200]: time="2025-05-13T00:42:58.227666043Z" level=error msg="encountered an error cleaning up failed sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.229272 env[1200]: time="2025-05-13T00:42:58.227715296Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d76zx,Uid:6fddd02c-1fa4-43a2-8ef4-f392621d04a3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.229404 kubelet[1939]: E0513 00:42:58.228204 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.229404 kubelet[1939]: E0513 00:42:58.228262 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d76zx" May 13 00:42:58.229404 kubelet[1939]: E0513 00:42:58.228285 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d76zx" May 13 00:42:58.227584 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa-shm.mount: Deactivated successfully. May 13 00:42:58.229569 kubelet[1939]: E0513 00:42:58.228332 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-d76zx_kube-system(6fddd02c-1fa4-43a2-8ef4-f392621d04a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-d76zx_kube-system(6fddd02c-1fa4-43a2-8ef4-f392621d04a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d76zx" podUID="6fddd02c-1fa4-43a2-8ef4-f392621d04a3" May 13 00:42:58.229827 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd-shm.mount: Deactivated successfully. May 13 00:42:58.230590 env[1200]: time="2025-05-13T00:42:58.230554980Z" level=error msg="Failed to destroy network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.230917 env[1200]: time="2025-05-13T00:42:58.230891905Z" level=error msg="encountered an error cleaning up failed sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.231397 env[1200]: time="2025-05-13T00:42:58.231367931Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-4dq6p,Uid:4eec60e7-c4b0-4219-aef2-0fcb74419d40,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.231704 kubelet[1939]: E0513 00:42:58.231672 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.231755 kubelet[1939]: E0513 00:42:58.231712 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-4dq6p" May 13 00:42:58.231755 kubelet[1939]: E0513 00:42:58.231730 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-4dq6p" May 13 00:42:58.231806 kubelet[1939]: E0513 00:42:58.231760 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-4dq6p_kube-system(4eec60e7-c4b0-4219-aef2-0fcb74419d40)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-4dq6p_kube-system(4eec60e7-c4b0-4219-aef2-0fcb74419d40)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-4dq6p" podUID="4eec60e7-c4b0-4219-aef2-0fcb74419d40" May 13 00:42:58.232299 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea-shm.mount: Deactivated successfully. May 13 00:42:58.232644 env[1200]: time="2025-05-13T00:42:58.232608125Z" level=error msg="encountered an error cleaning up failed sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.232693 env[1200]: time="2025-05-13T00:42:58.232659812Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5456bdc8dd-hs2rm,Uid:7b7c1ec1-9bea-4c58-a518-f3def3a292d1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.232833 kubelet[1939]: E0513 00:42:58.232797 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.232891 kubelet[1939]: E0513 00:42:58.232845 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" May 13 00:42:58.232891 kubelet[1939]: E0513 00:42:58.232863 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" May 13 00:42:58.232989 kubelet[1939]: E0513 00:42:58.232897 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5456bdc8dd-hs2rm_calico-system(7b7c1ec1-9bea-4c58-a518-f3def3a292d1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5456bdc8dd-hs2rm_calico-system(7b7c1ec1-9bea-4c58-a518-f3def3a292d1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" podUID="7b7c1ec1-9bea-4c58-a518-f3def3a292d1" May 13 00:42:58.237011 env[1200]: time="2025-05-13T00:42:58.236939927Z" level=error msg="Failed to destroy network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.237447 env[1200]: time="2025-05-13T00:42:58.237390175Z" level=error msg="encountered an error cleaning up failed sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.237519 env[1200]: time="2025-05-13T00:42:58.237475416Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xcl47,Uid:e567def1-96f2-4f21-9272-da1b9fb80faf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.237696 kubelet[1939]: E0513 00:42:58.237662 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.237772 kubelet[1939]: E0513 00:42:58.237715 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xcl47" May 13 00:42:58.238103 kubelet[1939]: E0513 00:42:58.237736 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xcl47" May 13 00:42:58.238288 kubelet[1939]: E0513 00:42:58.238124 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xcl47_calico-system(e567def1-96f2-4f21-9272-da1b9fb80faf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xcl47_calico-system(e567def1-96f2-4f21-9272-da1b9fb80faf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:58.249542 env[1200]: time="2025-05-13T00:42:58.249473687Z" level=error msg="Failed to destroy network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.249831 env[1200]: time="2025-05-13T00:42:58.249797497Z" level=error msg="encountered an error cleaning up failed sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.249867 env[1200]: time="2025-05-13T00:42:58.249843684Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-bj9md,Uid:9786ed1e-5caa-4eec-97c3-22894c003af9,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.250105 kubelet[1939]: E0513 00:42:58.250063 1939 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:58.250178 kubelet[1939]: E0513 00:42:58.250136 1939 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" May 13 00:42:58.250178 kubelet[1939]: E0513 00:42:58.250163 1939 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" May 13 00:42:58.250245 kubelet[1939]: E0513 00:42:58.250213 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5bb6dfd48b-bj9md_calico-apiserver(9786ed1e-5caa-4eec-97c3-22894c003af9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5bb6dfd48b-bj9md_calico-apiserver(9786ed1e-5caa-4eec-97c3-22894c003af9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" podUID="9786ed1e-5caa-4eec-97c3-22894c003af9" May 13 00:42:58.949541 kubelet[1939]: I0513 00:42:58.949504 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:42:58.950214 env[1200]: time="2025-05-13T00:42:58.950167915Z" level=info msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" May 13 00:42:58.950930 kubelet[1939]: I0513 00:42:58.950908 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:42:58.951251 env[1200]: time="2025-05-13T00:42:58.951215707Z" level=info msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" May 13 00:42:58.952473 kubelet[1939]: I0513 00:42:58.952434 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:42:58.953229 env[1200]: time="2025-05-13T00:42:58.953193129Z" level=info msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" May 13 00:42:58.954889 kubelet[1939]: I0513 00:42:58.954659 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:42:58.955091 env[1200]: time="2025-05-13T00:42:58.955057678Z" level=info msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" May 13 00:42:58.974000 kubelet[1939]: I0513 00:42:58.973295 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:42:58.974325 env[1200]: time="2025-05-13T00:42:58.974299193Z" level=info msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" May 13 00:42:58.975730 kubelet[1939]: I0513 00:42:58.975440 1939 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:42:58.975891 env[1200]: time="2025-05-13T00:42:58.975831297Z" level=info msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" May 13 00:42:59.004472 env[1200]: time="2025-05-13T00:42:59.004394083Z" level=error msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" failed" error="failed to destroy network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.004648 kubelet[1939]: E0513 00:42:59.004604 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:42:59.004717 kubelet[1939]: E0513 00:42:59.004662 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8"} May 13 00:42:59.004747 kubelet[1939]: E0513 00:42:59.004722 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e567def1-96f2-4f21-9272-da1b9fb80faf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.004811 kubelet[1939]: E0513 00:42:59.004743 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e567def1-96f2-4f21-9272-da1b9fb80faf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xcl47" podUID="e567def1-96f2-4f21-9272-da1b9fb80faf" May 13 00:42:59.006482 env[1200]: time="2025-05-13T00:42:59.006386702Z" level=error msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" failed" error="failed to destroy network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.006803 kubelet[1939]: E0513 00:42:59.006716 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:42:59.006803 kubelet[1939]: E0513 00:42:59.006738 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128"} May 13 00:42:59.006803 kubelet[1939]: E0513 00:42:59.006756 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.006803 kubelet[1939]: E0513 00:42:59.006772 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" podUID="ab9bc083-4c3d-4292-b3b3-19dedcfac5d7" May 13 00:42:59.012915 env[1200]: time="2025-05-13T00:42:59.012870774Z" level=error msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" failed" error="failed to destroy network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.013261 kubelet[1939]: E0513 00:42:59.013151 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:42:59.013261 kubelet[1939]: E0513 00:42:59.013192 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae"} May 13 00:42:59.013261 kubelet[1939]: E0513 00:42:59.013216 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9786ed1e-5caa-4eec-97c3-22894c003af9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.013261 kubelet[1939]: E0513 00:42:59.013235 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9786ed1e-5caa-4eec-97c3-22894c003af9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" podUID="9786ed1e-5caa-4eec-97c3-22894c003af9" May 13 00:42:59.016479 env[1200]: time="2025-05-13T00:42:59.016407659Z" level=error msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" failed" error="failed to destroy network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.016732 kubelet[1939]: E0513 00:42:59.016651 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:42:59.016732 kubelet[1939]: E0513 00:42:59.016673 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea"} May 13 00:42:59.016732 kubelet[1939]: E0513 00:42:59.016691 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4eec60e7-c4b0-4219-aef2-0fcb74419d40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.016732 kubelet[1939]: E0513 00:42:59.016709 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4eec60e7-c4b0-4219-aef2-0fcb74419d40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-4dq6p" podUID="4eec60e7-c4b0-4219-aef2-0fcb74419d40" May 13 00:42:59.028618 env[1200]: time="2025-05-13T00:42:59.028551851Z" level=error msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" failed" error="failed to destroy network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.029099 kubelet[1939]: E0513 00:42:59.029018 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:42:59.029172 kubelet[1939]: E0513 00:42:59.029099 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa"} May 13 00:42:59.029172 kubelet[1939]: E0513 00:42:59.029138 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7b7c1ec1-9bea-4c58-a518-f3def3a292d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.029172 kubelet[1939]: E0513 00:42:59.029160 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7b7c1ec1-9bea-4c58-a518-f3def3a292d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" podUID="7b7c1ec1-9bea-4c58-a518-f3def3a292d1" May 13 00:42:59.034859 env[1200]: time="2025-05-13T00:42:59.034811890Z" level=error msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" failed" error="failed to destroy network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:42:59.035011 kubelet[1939]: E0513 00:42:59.034974 1939 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:42:59.035011 kubelet[1939]: E0513 00:42:59.035009 1939 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd"} May 13 00:42:59.035121 kubelet[1939]: E0513 00:42:59.035039 1939 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6fddd02c-1fa4-43a2-8ef4-f392621d04a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:42:59.035121 kubelet[1939]: E0513 00:42:59.035054 1939 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6fddd02c-1fa4-43a2-8ef4-f392621d04a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d76zx" podUID="6fddd02c-1fa4-43a2-8ef4-f392621d04a3" May 13 00:42:59.173163 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8-shm.mount: Deactivated successfully. May 13 00:42:59.173282 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae-shm.mount: Deactivated successfully. May 13 00:43:02.096706 systemd[1]: Started sshd@9-10.0.0.65:22-10.0.0.1:33064.service. May 13 00:43:02.097902 kernel: kauditd_printk_skb: 63 callbacks suppressed May 13 00:43:02.097971 kernel: audit: type=1130 audit(1747096982.096:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.65:22-10.0.0.1:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:02.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.65:22-10.0.0.1:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:03.251000 audit[3047]: USER_ACCT pid=3047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.251870 sshd[3047]: Accepted publickey for core from 10.0.0.1 port 33064 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:03.253612 sshd[3047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:03.252000 audit[3047]: CRED_ACQ pid=3047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.257083 systemd-logind[1189]: New session 10 of user core. May 13 00:43:03.257817 systemd[1]: Started session-10.scope. May 13 00:43:03.260866 kernel: audit: type=1101 audit(1747096983.251:1004): pid=3047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.260925 kernel: audit: type=1103 audit(1747096983.252:1005): pid=3047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.260944 kernel: audit: type=1006 audit(1747096983.252:1006): pid=3047 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:43:03.252000 audit[3047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ce14120 a2=3 a3=0 items=0 ppid=1 pid=3047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:03.268783 kernel: audit: type=1300 audit(1747096983.252:1006): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ce14120 a2=3 a3=0 items=0 ppid=1 pid=3047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:03.268826 kernel: audit: type=1327 audit(1747096983.252:1006): proctitle=737368643A20636F7265205B707269765D May 13 00:43:03.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:03.261000 audit[3047]: USER_START pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.275574 kernel: audit: type=1105 audit(1747096983.261:1007): pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.262000 audit[3051]: CRED_ACQ pid=3051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.279745 kernel: audit: type=1103 audit(1747096983.262:1008): pid=3051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.381121 sshd[3047]: pam_unix(sshd:session): session closed for user core May 13 00:43:03.389603 kernel: audit: type=1106 audit(1747096983.381:1009): pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.389660 kernel: audit: type=1104 audit(1747096983.381:1010): pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.381000 audit[3047]: USER_END pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.381000 audit[3047]: CRED_DISP pid=3047 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:03.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.65:22-10.0.0.1:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:03.383575 systemd[1]: sshd@9-10.0.0.65:22-10.0.0.1:33064.service: Deactivated successfully. May 13 00:43:03.384287 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:43:03.384780 systemd-logind[1189]: Session 10 logged out. Waiting for processes to exit. May 13 00:43:03.385450 systemd-logind[1189]: Removed session 10. May 13 00:43:06.887371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount516361501.mount: Deactivated successfully. May 13 00:43:07.418665 env[1200]: time="2025-05-13T00:43:07.418596276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:07.421514 env[1200]: time="2025-05-13T00:43:07.421461400Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:07.423518 env[1200]: time="2025-05-13T00:43:07.423468241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:07.425030 env[1200]: time="2025-05-13T00:43:07.424990783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:07.425477 env[1200]: time="2025-05-13T00:43:07.425435338Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:43:07.438340 env[1200]: time="2025-05-13T00:43:07.437301598Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:43:07.459251 env[1200]: time="2025-05-13T00:43:07.459194391Z" level=info msg="CreateContainer within sandbox \"c5ef619e11e7d047ed986f9a0adcaca45bb5f211304f7274c9c4eb8e85421d85\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"40b63f594dfefb0aa842743ecd8d993ece9629ff16d9fe5b7574809cd553f164\"" May 13 00:43:07.459859 env[1200]: time="2025-05-13T00:43:07.459790741Z" level=info msg="StartContainer for \"40b63f594dfefb0aa842743ecd8d993ece9629ff16d9fe5b7574809cd553f164\"" May 13 00:43:07.476647 systemd[1]: Started cri-containerd-40b63f594dfefb0aa842743ecd8d993ece9629ff16d9fe5b7574809cd553f164.scope. May 13 00:43:07.493461 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:43:07.493591 kernel: audit: type=1400 audit(1747096987.491:1012): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc4df67e2f8 items=0 ppid=2412 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:07.501615 kernel: audit: type=1300 audit(1747096987.491:1012): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc4df67e2f8 items=0 ppid=2412 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:07.501727 kernel: audit: type=1327 audit(1747096987.491:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430623633663539346466656662306161383432373433656364386439 May 13 00:43:07.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430623633663539346466656662306161383432373433656364386439 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.510579 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.510691 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.517319 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.521066 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.523395 env[1200]: time="2025-05-13T00:43:07.523347483Z" level=info msg="StartContainer for \"40b63f594dfefb0aa842743ecd8d993ece9629ff16d9fe5b7574809cd553f164\" returns successfully" May 13 00:43:07.525614 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.525653 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.533609 kernel: audit: type=1400 audit(1747096987.491:1013): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.491000 audit: BPF prog-id=133 op=LOAD May 13 00:43:07.491000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000249d8 items=0 ppid=2412 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:07.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430623633663539346466656662306161383432373433656364386439 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.495000 audit: BPF prog-id=134 op=LOAD May 13 00:43:07.495000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024a28 items=0 ppid=2412 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:07.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430623633663539346466656662306161383432373433656364386439 May 13 00:43:07.501000 audit: BPF prog-id=134 op=UNLOAD May 13 00:43:07.501000 audit: BPF prog-id=133 op=UNLOAD May 13 00:43:07.501000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:07.501000 audit: BPF prog-id=135 op=LOAD May 13 00:43:07.501000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024ab8 items=0 ppid=2412 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:07.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430623633663539346466656662306161383432373433656364386439 May 13 00:43:07.592288 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:43:07.592395 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:43:08.158619 kubelet[1939]: E0513 00:43:08.158373 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:08.385039 systemd[1]: Started sshd@10-10.0.0.65:22-10.0.0.1:59898.service. May 13 00:43:08.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.65:22-10.0.0.1:59898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.418000 audit[3133]: USER_ACCT pid=3133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.419211 sshd[3133]: Accepted publickey for core from 10.0.0.1 port 59898 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:08.419000 audit[3133]: CRED_ACQ pid=3133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.419000 audit[3133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2ab83070 a2=3 a3=0 items=0 ppid=1 pid=3133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:08.420291 sshd[3133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:08.423483 systemd-logind[1189]: New session 11 of user core. May 13 00:43:08.424243 systemd[1]: Started session-11.scope. May 13 00:43:08.427000 audit[3133]: USER_START pid=3133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.428000 audit[3135]: CRED_ACQ pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.542038 sshd[3133]: pam_unix(sshd:session): session closed for user core May 13 00:43:08.542000 audit[3133]: USER_END pid=3133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.542000 audit[3133]: CRED_DISP pid=3133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.544948 systemd[1]: sshd@10-10.0.0.65:22-10.0.0.1:59898.service: Deactivated successfully. May 13 00:43:08.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.65:22-10.0.0.1:59898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.545484 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:43:08.546008 systemd-logind[1189]: Session 11 logged out. Waiting for processes to exit. May 13 00:43:08.546846 systemd[1]: Started sshd@11-10.0.0.65:22-10.0.0.1:59904.service. May 13 00:43:08.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.65:22-10.0.0.1:59904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.548850 systemd-logind[1189]: Removed session 11. May 13 00:43:08.577000 audit[3147]: USER_ACCT pid=3147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.578025 sshd[3147]: Accepted publickey for core from 10.0.0.1 port 59904 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:08.578000 audit[3147]: CRED_ACQ pid=3147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.578000 audit[3147]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3b2911c0 a2=3 a3=0 items=0 ppid=1 pid=3147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:08.579020 sshd[3147]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:08.582520 systemd-logind[1189]: New session 12 of user core. May 13 00:43:08.583182 systemd[1]: Started session-12.scope. May 13 00:43:08.587000 audit[3147]: USER_START pid=3147 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.588000 audit[3149]: CRED_ACQ pid=3149 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.728036 sshd[3147]: pam_unix(sshd:session): session closed for user core May 13 00:43:08.729000 audit[3147]: USER_END pid=3147 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.729000 audit[3147]: CRED_DISP pid=3147 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.65:22-10.0.0.1:59904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.731519 systemd[1]: sshd@11-10.0.0.65:22-10.0.0.1:59904.service: Deactivated successfully. May 13 00:43:08.732030 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:43:08.733541 systemd-logind[1189]: Session 12 logged out. Waiting for processes to exit. May 13 00:43:08.734120 systemd[1]: Started sshd@12-10.0.0.65:22-10.0.0.1:59910.service. May 13 00:43:08.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.65:22-10.0.0.1:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.736561 systemd-logind[1189]: Removed session 12. May 13 00:43:08.771000 audit[3158]: USER_ACCT pid=3158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.771779 sshd[3158]: Accepted publickey for core from 10.0.0.1 port 59910 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:08.772000 audit[3158]: CRED_ACQ pid=3158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.772000 audit[3158]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff50d2f60 a2=3 a3=0 items=0 ppid=1 pid=3158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:08.772735 sshd[3158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:08.776248 systemd-logind[1189]: New session 13 of user core. May 13 00:43:08.777060 systemd[1]: Started session-13.scope. May 13 00:43:08.780000 audit[3158]: USER_START pid=3158 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.781000 audit[3160]: CRED_ACQ pid=3160 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.803000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=24981 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.803000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe82064a17 a2=241 a3=1b6 items=1 ppid=3177 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.803000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:43:08.803000 audit: PATH item=0 name="/dev/fd/63" inode=23550 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.803000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.809000 audit[3227]: AVC avc: denied { write } for pid=3227 comm="tee" name="fd" dev="proc" ino=24379 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.809000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2e6cfa28 a2=241 a3=1b6 items=1 ppid=3171 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.809000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:43:08.809000 audit: PATH item=0 name="/dev/fd/63" inode=26631 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.837000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=24387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.837000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5fea0a27 a2=241 a3=1b6 items=1 ppid=3173 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.837000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:43:08.837000 audit: PATH item=0 name="/dev/fd/63" inode=26627 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.837000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.848000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=24992 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.848000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6c039a26 a2=241 a3=1b6 items=1 ppid=3181 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.848000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:43:08.848000 audit: PATH item=0 name="/dev/fd/63" inode=26636 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.850000 audit[3235]: AVC avc: denied { write } for pid=3235 comm="tee" name="fd" dev="proc" ino=24393 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.850000 audit[3235]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecadd6a26 a2=241 a3=1b6 items=1 ppid=3172 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.850000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:43:08.850000 audit: PATH item=0 name="/dev/fd/63" inode=26633 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.850000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.855000 audit[3211]: AVC avc: denied { write } for pid=3211 comm="tee" name="fd" dev="proc" ino=24397 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.855000 audit[3211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf5d88a26 a2=241 a3=1b6 items=1 ppid=3169 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.855000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:43:08.855000 audit: PATH item=0 name="/dev/fd/63" inode=24372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.855000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.868000 audit[3261]: AVC avc: denied { write } for pid=3261 comm="tee" name="fd" dev="proc" ino=24996 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:43:08.868000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd6f8ca16 a2=241 a3=1b6 items=1 ppid=3179 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.868000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:43:08.868000 audit: PATH item=0 name="/dev/fd/63" inode=26637 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:08.868000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:43:08.932180 sshd[3158]: pam_unix(sshd:session): session closed for user core May 13 00:43:08.932000 audit[3158]: USER_END pid=3158 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.932000 audit[3158]: CRED_DISP pid=3158 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:08.935096 systemd[1]: sshd@12-10.0.0.65:22-10.0.0.1:59910.service: Deactivated successfully. May 13 00:43:08.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.65:22-10.0.0.1:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:08.936456 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:43:08.937271 systemd-logind[1189]: Session 13 logged out. Waiting for processes to exit. May 13 00:43:08.938171 systemd-logind[1189]: Removed session 13. May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit: BPF prog-id=136 op=LOAD May 13 00:43:08.967000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda59310d0 a2=98 a3=3 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:08.967000 audit: BPF prog-id=136 op=UNLOAD May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit: BPF prog-id=137 op=LOAD May 13 00:43:08.967000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda5930eb0 a2=74 a3=540051 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:08.967000 audit: BPF prog-id=137 op=UNLOAD May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:08.967000 audit: BPF prog-id=138 op=LOAD May 13 00:43:08.967000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda5930ee0 a2=94 a3=2 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:08.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:08.967000 audit: BPF prog-id=138 op=UNLOAD May 13 00:43:09.089000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit: BPF prog-id=139 op=LOAD May 13 00:43:09.089000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda5930da0 a2=40 a3=1 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.089000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.089000 audit: BPF prog-id=139 op=UNLOAD May 13 00:43:09.089000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.089000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda5930e70 a2=50 a3=7ffda5930f50 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.089000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930db0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda5930de0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda5930cf0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930e00 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930de0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930dd0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930e00 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda5930de0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda5930e00 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda5930dd0 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda5930e40 a2=28 a3=0 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda5930bf0 a2=50 a3=1 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit: BPF prog-id=140 op=LOAD May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda5930bf0 a2=94 a3=5 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit: BPF prog-id=140 op=UNLOAD May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda5930ca0 a2=50 a3=1 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffda5930dc0 a2=4 a3=38 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.098000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.098000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda5930e10 a2=94 a3=6 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.099000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda59305c0 a2=94 a3=83 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.099000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.099000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda59305c0 a2=94 a3=83 items=0 ppid=3175 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:43:09.105000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.105000 audit: BPF prog-id=141 op=LOAD May 13 00:43:09.105000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0885f5a0 a2=98 a3=1999999999999999 items=0 ppid=3175 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.105000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:43:09.106000 audit: BPF prog-id=141 op=UNLOAD May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit: BPF prog-id=142 op=LOAD May 13 00:43:09.106000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0885f480 a2=74 a3=ffff items=0 ppid=3175 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:43:09.106000 audit: BPF prog-id=142 op=UNLOAD May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.106000 audit: BPF prog-id=143 op=LOAD May 13 00:43:09.106000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0885f4c0 a2=40 a3=7ffd0885f6a0 items=0 ppid=3175 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:43:09.106000 audit: BPF prog-id=143 op=UNLOAD May 13 00:43:09.141051 systemd-networkd[1021]: vxlan.calico: Link UP May 13 00:43:09.141058 systemd-networkd[1021]: vxlan.calico: Gained carrier May 13 00:43:09.160000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.160000 audit: BPF prog-id=144 op=LOAD May 13 00:43:09.160000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2fe2c260 a2=98 a3=ffffffff items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.160000 audit: BPF prog-id=144 op=UNLOAD May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit: BPF prog-id=145 op=LOAD May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2fe2c070 a2=74 a3=540051 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit: BPF prog-id=145 op=UNLOAD May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit: BPF prog-id=146 op=LOAD May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2fe2c0a0 a2=94 a3=2 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit: BPF prog-id=146 op=UNLOAD May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd2fe2bf70 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2fe2bfa0 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2fe2beb0 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd2fe2bfc0 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd2fe2bfa0 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.161000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.161000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd2fe2bf90 a2=28 a3=0 items=0 ppid=3175 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit: BPF prog-id=150 op=LOAD May 13 00:43:09.165000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda32fc680 a2=98 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.165000 audit: BPF prog-id=150 op=UNLOAD May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit: BPF prog-id=151 op=LOAD May 13 00:43:09.165000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda32fc460 a2=74 a3=540051 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.165000 audit: BPF prog-id=151 op=UNLOAD May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.165000 audit: BPF prog-id=152 op=LOAD May 13 00:43:09.165000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda32fc490 a2=94 a3=2 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.165000 audit: BPF prog-id=152 op=UNLOAD May 13 00:43:09.269752 kubelet[1939]: I0513 00:43:09.268967 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:43:09.269752 kubelet[1939]: E0513 00:43:09.269396 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:09.270000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit: BPF prog-id=153 op=LOAD May 13 00:43:09.270000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda32fc350 a2=40 a3=1 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.270000 audit: BPF prog-id=153 op=UNLOAD May 13 00:43:09.270000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.270000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda32fc420 a2=50 a3=7ffda32fc500 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc360 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda32fc390 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda32fc2a0 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc3b0 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc390 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc380 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc3b0 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda32fc390 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda32fc3b0 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda32fc380 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.277000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.277000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda32fc3f0 a2=28 a3=0 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda32fc1a0 a2=50 a3=1 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit: BPF prog-id=154 op=LOAD May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda32fc1a0 a2=94 a3=5 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit: BPF prog-id=154 op=UNLOAD May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda32fc250 a2=50 a3=1 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffda32fc370 a2=4 a3=38 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { confidentiality } for pid=3331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda32fc3c0 a2=94 a3=6 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { confidentiality } for pid=3331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda32fbb70 a2=94 a3=83 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { perfmon } for pid=3331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { confidentiality } for pid=3331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda32fbb70 a2=94 a3=83 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.278000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.278000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda32fd5b0 a2=10 a3=208 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.279000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.279000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda32fd450 a2=10 a3=3 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.279000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.279000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda32fd3f0 a2=10 a3=3 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.279000 audit[3331]: AVC avc: denied { bpf } for pid=3331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:09.279000 audit[3331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda32fd3f0 a2=10 a3=7 items=0 ppid=3175 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:43:09.289000 audit: BPF prog-id=149 op=UNLOAD May 13 00:43:09.333000 audit[3381]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:09.333000 audit[3381]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc21766a80 a2=0 a3=7ffc21766a6c items=0 ppid=3175 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:09.343000 audit[3382]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3382 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:09.343000 audit[3382]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff3bcb3170 a2=0 a3=7fff3bcb315c items=0 ppid=3175 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:09.346000 audit[3389]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3389 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:09.346000 audit[3389]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe5aa12a20 a2=0 a3=7ffe5aa12a0c items=0 ppid=3175 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:09.353000 audit[3380]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=3380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:09.353000 audit[3380]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdce2e1ac0 a2=0 a3=7ffdce2e1aac items=0 ppid=3175 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:09.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:09.724213 env[1200]: time="2025-05-13T00:43:09.723481912Z" level=info msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" May 13 00:43:09.724213 env[1200]: time="2025-05-13T00:43:09.723675306Z" level=info msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" May 13 00:43:09.782596 kubelet[1939]: I0513 00:43:09.781620 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vv9wv" podStartSLOduration=3.502848159 podStartE2EDuration="28.781597984s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:42:42.147481529 +0000 UTC m=+18.507353148" lastFinishedPulling="2025-05-13 00:43:07.426231354 +0000 UTC m=+43.786102973" observedRunningTime="2025-05-13 00:43:08.171535877 +0000 UTC m=+44.531407496" watchObservedRunningTime="2025-05-13 00:43:09.781597984 +0000 UTC m=+46.141469603" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.781 [INFO][3445] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.782 [INFO][3445] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" iface="eth0" netns="/var/run/netns/cni-74924e0a-f063-3c70-d6fb-7e744299d56d" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.783 [INFO][3445] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" iface="eth0" netns="/var/run/netns/cni-74924e0a-f063-3c70-d6fb-7e744299d56d" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.783 [INFO][3445] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" iface="eth0" netns="/var/run/netns/cni-74924e0a-f063-3c70-d6fb-7e744299d56d" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.783 [INFO][3445] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.783 [INFO][3445] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.837 [INFO][3463] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.837 [INFO][3463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.837 [INFO][3463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.846 [WARNING][3463] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.846 [INFO][3463] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.848 [INFO][3463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:09.852324 env[1200]: 2025-05-13 00:43:09.849 [INFO][3445] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:09.855262 systemd[1]: run-netns-cni\x2d74924e0a\x2df063\x2d3c70\x2dd6fb\x2d7e744299d56d.mount: Deactivated successfully. May 13 00:43:09.855544 env[1200]: time="2025-05-13T00:43:09.855506607Z" level=info msg="TearDown network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" successfully" May 13 00:43:09.855580 env[1200]: time="2025-05-13T00:43:09.855543686Z" level=info msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" returns successfully" May 13 00:43:09.856284 env[1200]: time="2025-05-13T00:43:09.856246357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xcl47,Uid:e567def1-96f2-4f21-9272-da1b9fb80faf,Namespace:calico-system,Attempt:1,}" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.782 [INFO][3446] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.783 [INFO][3446] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" iface="eth0" netns="/var/run/netns/cni-8ab36398-4251-3ff1-4465-e6b0672528b9" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.783 [INFO][3446] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" iface="eth0" netns="/var/run/netns/cni-8ab36398-4251-3ff1-4465-e6b0672528b9" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.783 [INFO][3446] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" iface="eth0" netns="/var/run/netns/cni-8ab36398-4251-3ff1-4465-e6b0672528b9" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.783 [INFO][3446] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.783 [INFO][3446] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.844 [INFO][3464] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.845 [INFO][3464] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.848 [INFO][3464] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.853 [WARNING][3464] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.853 [INFO][3464] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.854 [INFO][3464] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:09.860919 env[1200]: 2025-05-13 00:43:09.858 [INFO][3446] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:09.863314 systemd[1]: run-netns-cni\x2d8ab36398\x2d4251\x2d3ff1\x2d4465\x2de6b0672528b9.mount: Deactivated successfully. May 13 00:43:09.864156 env[1200]: time="2025-05-13T00:43:09.864116764Z" level=info msg="TearDown network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" successfully" May 13 00:43:09.864219 env[1200]: time="2025-05-13T00:43:09.864154826Z" level=info msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" returns successfully" May 13 00:43:09.864501 kubelet[1939]: E0513 00:43:09.864463 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:09.864826 env[1200]: time="2025-05-13T00:43:09.864775942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d76zx,Uid:6fddd02c-1fa4-43a2-8ef4-f392621d04a3,Namespace:kube-system,Attempt:1,}" May 13 00:43:10.223535 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL May 13 00:43:10.319287 systemd-networkd[1021]: cali6f55846bfb3: Link UP May 13 00:43:10.334354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:43:10.334503 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f55846bfb3: link becomes ready May 13 00:43:10.334834 systemd-networkd[1021]: cali6f55846bfb3: Gained carrier May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.069 [INFO][3480] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--xcl47-eth0 csi-node-driver- calico-system e567def1-96f2-4f21-9272-da1b9fb80faf 885 0 2025-05-13 00:42:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-xcl47 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6f55846bfb3 [] []}} ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.069 [INFO][3480] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.099 [INFO][3508] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" HandleID="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.108 [INFO][3508] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" HandleID="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5c50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-xcl47", "timestamp":"2025-05-13 00:43:10.099248734 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.108 [INFO][3508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.108 [INFO][3508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.108 [INFO][3508] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.110 [INFO][3508] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.128 [INFO][3508] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.132 [INFO][3508] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.133 [INFO][3508] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.135 [INFO][3508] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.135 [INFO][3508] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.136 [INFO][3508] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233 May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.231 [INFO][3508] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.315 [INFO][3508] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.315 [INFO][3508] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" host="localhost" May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.315 [INFO][3508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:10.433630 env[1200]: 2025-05-13 00:43:10.315 [INFO][3508] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" HandleID="k8s-pod-network.c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.317 [INFO][3480] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xcl47-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e567def1-96f2-4f21-9272-da1b9fb80faf", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-xcl47", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6f55846bfb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.317 [INFO][3480] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.317 [INFO][3480] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6f55846bfb3 ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.334 [INFO][3480] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.335 [INFO][3480] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xcl47-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e567def1-96f2-4f21-9272-da1b9fb80faf", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233", Pod:"csi-node-driver-xcl47", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6f55846bfb3", MAC:"66:11:7a:1e:bb:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:10.434304 env[1200]: 2025-05-13 00:43:10.431 [INFO][3480] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233" Namespace="calico-system" Pod="csi-node-driver-xcl47" WorkloadEndpoint="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:10.442000 audit[3538]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:10.442000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe77e727e0 a2=0 a3=7ffe77e727cc items=0 ppid=3175 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.442000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:10.589324 systemd-networkd[1021]: cali5871d0f7585: Link UP May 13 00:43:10.590697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5871d0f7585: link becomes ready May 13 00:43:10.590460 systemd-networkd[1021]: cali5871d0f7585: Gained carrier May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.071 [INFO][3491] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--d76zx-eth0 coredns-668d6bf9bc- kube-system 6fddd02c-1fa4-43a2-8ef4-f392621d04a3 884 0 2025-05-13 00:42:32 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-d76zx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5871d0f7585 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.071 [INFO][3491] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.109 [INFO][3515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" HandleID="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.130 [INFO][3515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" HandleID="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000362b40), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-d76zx", "timestamp":"2025-05-13 00:43:10.109255713 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.130 [INFO][3515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.315 [INFO][3515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.315 [INFO][3515] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.317 [INFO][3515] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.388 [INFO][3515] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.433 [INFO][3515] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.435 [INFO][3515] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.438 [INFO][3515] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.438 [INFO][3515] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.440 [INFO][3515] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.557 [INFO][3515] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.585 [INFO][3515] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.586 [INFO][3515] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" host="localhost" May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.586 [INFO][3515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:10.615687 env[1200]: 2025-05-13 00:43:10.586 [INFO][3515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" HandleID="k8s-pod-network.0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.588 [INFO][3491] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d76zx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6fddd02c-1fa4-43a2-8ef4-f392621d04a3", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-d76zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5871d0f7585", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.588 [INFO][3491] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.588 [INFO][3491] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5871d0f7585 ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.590 [INFO][3491] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.590 [INFO][3491] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d76zx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6fddd02c-1fa4-43a2-8ef4-f392621d04a3", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af", Pod:"coredns-668d6bf9bc-d76zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5871d0f7585", MAC:"ca:fc:31:2d:f0:46", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:10.616538 env[1200]: 2025-05-13 00:43:10.613 [INFO][3491] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af" Namespace="kube-system" Pod="coredns-668d6bf9bc-d76zx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:10.622000 audit[3554]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=3554 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:10.622000 audit[3554]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffdbb251680 a2=0 a3=7ffdbb25166c items=0 ppid=3175 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.622000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:10.819624 env[1200]: time="2025-05-13T00:43:10.819558850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:10.819624 env[1200]: time="2025-05-13T00:43:10.819621749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:10.819993 env[1200]: time="2025-05-13T00:43:10.819633922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:10.819993 env[1200]: time="2025-05-13T00:43:10.819739690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233 pid=3565 runtime=io.containerd.runc.v2 May 13 00:43:10.822772 env[1200]: time="2025-05-13T00:43:10.822663643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:10.822830 env[1200]: time="2025-05-13T00:43:10.822790511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:10.822859 env[1200]: time="2025-05-13T00:43:10.822826970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:10.822990 env[1200]: time="2025-05-13T00:43:10.822959269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af pid=3580 runtime=io.containerd.runc.v2 May 13 00:43:10.835058 systemd[1]: run-containerd-runc-k8s.io-c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233-runc.vzttIy.mount: Deactivated successfully. May 13 00:43:10.839226 systemd[1]: Started cri-containerd-0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af.scope. May 13 00:43:10.840071 systemd[1]: Started cri-containerd-c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233.scope. May 13 00:43:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.850000 audit: BPF prog-id=155 op=LOAD May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3580 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653732386163633866636632666532393562383038633839663465 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3580 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653732386163633866636632666532393562383038633839663465 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit: BPF prog-id=156 op=LOAD May 13 00:43:10.851000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003440a0 items=0 ppid=3580 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653732386163633866636632666532393562383038633839663465 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit: BPF prog-id=157 op=LOAD May 13 00:43:10.851000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003440e8 items=0 ppid=3580 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653732386163633866636632666532393562383038633839663465 May 13 00:43:10.851000 audit: BPF prog-id=157 op=UNLOAD May 13 00:43:10.851000 audit: BPF prog-id=156 op=UNLOAD May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.851000 audit: BPF prog-id=158 op=LOAD May 13 00:43:10.851000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003444f8 items=0 ppid=3580 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653732386163633866636632666532393562383038633839663465 May 13 00:43:10.852666 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.853000 audit: BPF prog-id=159 op=LOAD May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3565 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646265666230376532313766303335363832633162633232383563 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3565 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646265666230376532313766303335363832633162633232383563 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit: BPF prog-id=160 op=LOAD May 13 00:43:10.854000 audit[3585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324290 items=0 ppid=3565 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646265666230376532313766303335363832633162633232383563 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit: BPF prog-id=161 op=LOAD May 13 00:43:10.854000 audit[3585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003242d8 items=0 ppid=3565 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646265666230376532313766303335363832633162633232383563 May 13 00:43:10.854000 audit: BPF prog-id=161 op=UNLOAD May 13 00:43:10.854000 audit: BPF prog-id=160 op=UNLOAD May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { perfmon } for pid=3585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit[3585]: AVC avc: denied { bpf } for pid=3585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:10.854000 audit: BPF prog-id=162 op=LOAD May 13 00:43:10.854000 audit[3585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003246e8 items=0 ppid=3565 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:10.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646265666230376532313766303335363832633162633232383563 May 13 00:43:10.855348 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:10.865514 env[1200]: time="2025-05-13T00:43:10.865206276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xcl47,Uid:e567def1-96f2-4f21-9272-da1b9fb80faf,Namespace:calico-system,Attempt:1,} returns sandbox id \"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233\"" May 13 00:43:10.866762 env[1200]: time="2025-05-13T00:43:10.866726903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:43:10.876000 env[1200]: time="2025-05-13T00:43:10.875950992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d76zx,Uid:6fddd02c-1fa4-43a2-8ef4-f392621d04a3,Namespace:kube-system,Attempt:1,} returns sandbox id \"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af\"" May 13 00:43:10.876577 kubelet[1939]: E0513 00:43:10.876542 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:10.878239 env[1200]: time="2025-05-13T00:43:10.878194787Z" level=info msg="CreateContainer within sandbox \"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:43:11.034739 env[1200]: time="2025-05-13T00:43:11.034677449Z" level=info msg="CreateContainer within sandbox \"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4dcb39c16de38385cef8fc0a2da807c5d91639a53be7b0c6714aa29b4a41c68e\"" May 13 00:43:11.035242 env[1200]: time="2025-05-13T00:43:11.035208145Z" level=info msg="StartContainer for \"4dcb39c16de38385cef8fc0a2da807c5d91639a53be7b0c6714aa29b4a41c68e\"" May 13 00:43:11.048723 systemd[1]: Started cri-containerd-4dcb39c16de38385cef8fc0a2da807c5d91639a53be7b0c6714aa29b4a41c68e.scope. May 13 00:43:11.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.059000 audit: BPF prog-id=163 op=LOAD May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3580 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636233396331366465333833383563656638666330613264613830 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3580 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636233396331366465333833383563656638666330613264613830 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit: BPF prog-id=164 op=LOAD May 13 00:43:11.060000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218e70 items=0 ppid=3580 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636233396331366465333833383563656638666330613264613830 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit: BPF prog-id=165 op=LOAD May 13 00:43:11.060000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218eb8 items=0 ppid=3580 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636233396331366465333833383563656638666330613264613830 May 13 00:43:11.060000 audit: BPF prog-id=165 op=UNLOAD May 13 00:43:11.060000 audit: BPF prog-id=164 op=UNLOAD May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:11.060000 audit: BPF prog-id=166 op=LOAD May 13 00:43:11.060000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002192c8 items=0 ppid=3580 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636233396331366465333833383563656638666330613264613830 May 13 00:43:11.071338 env[1200]: time="2025-05-13T00:43:11.071296286Z" level=info msg="StartContainer for \"4dcb39c16de38385cef8fc0a2da807c5d91639a53be7b0c6714aa29b4a41c68e\" returns successfully" May 13 00:43:11.103000 audit[3656]: AVC avc: denied { getattr } for pid=3656 comm="coredns" path="cgroup:[4026532642]" dev="nsfs" ino=4026532642 scontext=system_u:system_r:svirt_lxc_net_t:s0:c839,c886 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:43:11.103000 audit[3656]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0000fc990 a2=c00050dd78 a3=0 items=0 ppid=3580 pid=3656 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c839,c886 key=(null) May 13 00:43:11.103000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:43:11.165919 kubelet[1939]: E0513 00:43:11.165849 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:11.189223 kubelet[1939]: I0513 00:43:11.189150 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-d76zx" podStartSLOduration=39.189126186 podStartE2EDuration="39.189126186s" podCreationTimestamp="2025-05-13 00:42:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:11.176130855 +0000 UTC m=+47.536002474" watchObservedRunningTime="2025-05-13 00:43:11.189126186 +0000 UTC m=+47.548997805" May 13 00:43:11.189000 audit[3678]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:11.189000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc233de310 a2=0 a3=7ffc233de2fc items=0 ppid=2128 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:11.194000 audit[3678]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:11.194000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc233de310 a2=0 a3=0 items=0 ppid=2128 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:11.220000 audit[3680]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:11.220000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff01e113e0 a2=0 a3=7fff01e113cc items=0 ppid=2128 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:11.227000 audit[3680]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:11.227000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff01e113e0 a2=0 a3=7fff01e113cc items=0 ppid=2128 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:11.376582 systemd-networkd[1021]: cali6f55846bfb3: Gained IPv6LL May 13 00:43:12.169346 kubelet[1939]: E0513 00:43:12.169300 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:12.655708 systemd-networkd[1021]: cali5871d0f7585: Gained IPv6LL May 13 00:43:12.722867 env[1200]: time="2025-05-13T00:43:12.722817932Z" level=info msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" May 13 00:43:12.723232 env[1200]: time="2025-05-13T00:43:12.722841085Z" level=info msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" May 13 00:43:12.723287 env[1200]: time="2025-05-13T00:43:12.722848299Z" level=info msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" iface="eth0" netns="/var/run/netns/cni-e0b281c9-fc0d-9a19-cc90-e5f604d6dd87" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" iface="eth0" netns="/var/run/netns/cni-e0b281c9-fc0d-9a19-cc90-e5f604d6dd87" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" iface="eth0" netns="/var/run/netns/cni-e0b281c9-fc0d-9a19-cc90-e5f604d6dd87" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.812 [INFO][3732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.869 [INFO][3757] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.869 [INFO][3757] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.869 [INFO][3757] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.874 [WARNING][3757] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.874 [INFO][3757] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.876 [INFO][3757] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:12.880446 env[1200]: 2025-05-13 00:43:12.878 [INFO][3732] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:12.883471 env[1200]: time="2025-05-13T00:43:12.880608009Z" level=info msg="TearDown network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" successfully" May 13 00:43:12.883471 env[1200]: time="2025-05-13T00:43:12.880970090Z" level=info msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" returns successfully" May 13 00:43:12.882810 systemd[1]: run-netns-cni\x2de0b281c9\x2dfc0d\x2d9a19\x2dcc90\x2de5f604d6dd87.mount: Deactivated successfully. May 13 00:43:12.884160 kubelet[1939]: E0513 00:43:12.884139 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:12.884861 env[1200]: time="2025-05-13T00:43:12.884828717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-4dq6p,Uid:4eec60e7-c4b0-4219-aef2-0fcb74419d40,Namespace:kube-system,Attempt:1,}" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" iface="eth0" netns="/var/run/netns/cni-18185cee-e506-37a6-29b3-129ddfafcc2c" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" iface="eth0" netns="/var/run/netns/cni-18185cee-e506-37a6-29b3-129ddfafcc2c" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" iface="eth0" netns="/var/run/netns/cni-18185cee-e506-37a6-29b3-129ddfafcc2c" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.832 [INFO][3733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.872 [INFO][3759] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.873 [INFO][3759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.876 [INFO][3759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.881 [WARNING][3759] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.881 [INFO][3759] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.882 [INFO][3759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:12.886565 env[1200]: 2025-05-13 00:43:12.884 [INFO][3733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:12.891596 env[1200]: time="2025-05-13T00:43:12.891542898Z" level=info msg="TearDown network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" successfully" May 13 00:43:12.891596 env[1200]: time="2025-05-13T00:43:12.891585910Z" level=info msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" returns successfully" May 13 00:43:12.892870 env[1200]: time="2025-05-13T00:43:12.892823915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-bj9md,Uid:9786ed1e-5caa-4eec-97c3-22894c003af9,Namespace:calico-apiserver,Attempt:1,}" May 13 00:43:12.897027 systemd[1]: run-netns-cni\x2d18185cee\x2de506\x2d37a6\x2d29b3\x2d129ddfafcc2c.mount: Deactivated successfully. May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.858 [INFO][3734] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.858 [INFO][3734] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" iface="eth0" netns="/var/run/netns/cni-17890fa1-d3af-b35a-d561-e9b8c3cb0e69" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.859 [INFO][3734] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" iface="eth0" netns="/var/run/netns/cni-17890fa1-d3af-b35a-d561-e9b8c3cb0e69" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.859 [INFO][3734] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" iface="eth0" netns="/var/run/netns/cni-17890fa1-d3af-b35a-d561-e9b8c3cb0e69" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.859 [INFO][3734] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.859 [INFO][3734] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.901 [INFO][3771] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.901 [INFO][3771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.901 [INFO][3771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.907 [WARNING][3771] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.907 [INFO][3771] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.909 [INFO][3771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:12.928793 env[1200]: 2025-05-13 00:43:12.925 [INFO][3734] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:12.930051 env[1200]: time="2025-05-13T00:43:12.929951311Z" level=info msg="TearDown network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" successfully" May 13 00:43:12.930496 env[1200]: time="2025-05-13T00:43:12.930475215Z" level=info msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" returns successfully" May 13 00:43:12.932954 env[1200]: time="2025-05-13T00:43:12.932931820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-xqg2g,Uid:ab9bc083-4c3d-4292-b3b3-19dedcfac5d7,Namespace:calico-apiserver,Attempt:1,}" May 13 00:43:13.036458 systemd-networkd[1021]: calia7dcf9259a7: Link UP May 13 00:43:13.038712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:43:13.038772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7dcf9259a7: link becomes ready May 13 00:43:13.038880 systemd-networkd[1021]: calia7dcf9259a7: Gained carrier May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.962 [INFO][3780] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0 calico-apiserver-5bb6dfd48b- calico-apiserver 9786ed1e-5caa-4eec-97c3-22894c003af9 919 0 2025-05-13 00:42:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bb6dfd48b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5bb6dfd48b-bj9md eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia7dcf9259a7 [] []}} ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.962 [INFO][3780] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.991 [INFO][3822] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" HandleID="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.998 [INFO][3822] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" HandleID="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000118590), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5bb6dfd48b-bj9md", "timestamp":"2025-05-13 00:43:12.991211236 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.999 [INFO][3822] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.999 [INFO][3822] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:12.999 [INFO][3822] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.000 [INFO][3822] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.006 [INFO][3822] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.011 [INFO][3822] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.014 [INFO][3822] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.017 [INFO][3822] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.017 [INFO][3822] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.018 [INFO][3822] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.024 [INFO][3822] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.031 [INFO][3822] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.031 [INFO][3822] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" host="localhost" May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.031 [INFO][3822] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:13.048623 env[1200]: 2025-05-13 00:43:13.031 [INFO][3822] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" HandleID="k8s-pod-network.6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.033 [INFO][3780] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"9786ed1e-5caa-4eec-97c3-22894c003af9", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5bb6dfd48b-bj9md", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7dcf9259a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.033 [INFO][3780] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.034 [INFO][3780] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia7dcf9259a7 ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.038 [INFO][3780] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.039 [INFO][3780] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"9786ed1e-5caa-4eec-97c3-22894c003af9", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a", Pod:"calico-apiserver-5bb6dfd48b-bj9md", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7dcf9259a7", MAC:"0e:e2:0f:43:76:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.049216 env[1200]: 2025-05-13 00:43:13.047 [INFO][3780] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-bj9md" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:13.056000 audit[3862]: NETFILTER_CFG table=filter:111 family=2 entries=48 op=nft_register_chain pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:13.057704 kernel: kauditd_printk_skb: 835 callbacks suppressed May 13 00:43:13.057753 kernel: audit: type=1325 audit(1747096993.056:1196): table=filter:111 family=2 entries=48 op=nft_register_chain pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:13.059117 env[1200]: time="2025-05-13T00:43:13.059072410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:13.059250 env[1200]: time="2025-05-13T00:43:13.059223444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:13.059327 env[1200]: time="2025-05-13T00:43:13.059256396Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:13.059463 env[1200]: time="2025-05-13T00:43:13.059432867Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a pid=3871 runtime=io.containerd.runc.v2 May 13 00:43:13.056000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffe3c3d3710 a2=0 a3=7ffe3c3d36fc items=0 ppid=3175 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.064592 kernel: audit: type=1300 audit(1747096993.056:1196): arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffe3c3d3710 a2=0 a3=7ffe3c3d36fc items=0 ppid=3175 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.064661 kernel: audit: type=1327 audit(1747096993.056:1196): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:13.056000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:13.069227 systemd[1]: Started cri-containerd-6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a.scope. May 13 00:43:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082447 kernel: audit: type=1400 audit(1747096993.079:1197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082716 kernel: audit: type=1400 audit(1747096993.079:1198): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.088282 kernel: audit: type=1400 audit(1747096993.079:1199): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.088325 kernel: audit: type=1400 audit(1747096993.079:1200): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.091239 kernel: audit: type=1400 audit(1747096993.079:1201): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.094182 kernel: audit: type=1400 audit(1747096993.079:1202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.100346 kernel: audit: type=1400 audit(1747096993.079:1203): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.101230 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit: BPF prog-id=167 op=LOAD May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3871 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623633366534353237393731316537353135383139303762626138 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3871 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623633366534353237393731316537353135383139303762626138 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.082000 audit: BPF prog-id=168 op=LOAD May 13 00:43:13.082000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029f060 items=0 ppid=3871 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623633366534353237393731316537353135383139303762626138 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.087000 audit: BPF prog-id=169 op=LOAD May 13 00:43:13.087000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029f0a8 items=0 ppid=3871 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623633366534353237393731316537353135383139303762626138 May 13 00:43:13.093000 audit: BPF prog-id=169 op=UNLOAD May 13 00:43:13.093000 audit: BPF prog-id=168 op=UNLOAD May 13 00:43:13.093000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.093000 audit: BPF prog-id=170 op=LOAD May 13 00:43:13.093000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029f4b8 items=0 ppid=3871 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623633366534353237393731316537353135383139303762626138 May 13 00:43:13.134691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calida02813bc73: link becomes ready May 13 00:43:13.134182 systemd-networkd[1021]: calida02813bc73: Link UP May 13 00:43:13.134308 systemd-networkd[1021]: calida02813bc73: Gained carrier May 13 00:43:13.139533 env[1200]: time="2025-05-13T00:43:13.139424984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-bj9md,Uid:9786ed1e-5caa-4eec-97c3-22894c003af9,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a\"" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:12.966 [INFO][3794] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0 coredns-668d6bf9bc- kube-system 4eec60e7-c4b0-4219-aef2-0fcb74419d40 918 0 2025-05-13 00:42:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-4dq6p eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calida02813bc73 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:12.967 [INFO][3794] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.010 [INFO][3830] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" HandleID="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.017 [INFO][3830] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" HandleID="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033d710), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-4dq6p", "timestamp":"2025-05-13 00:43:13.01007197 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.017 [INFO][3830] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.032 [INFO][3830] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.032 [INFO][3830] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.101 [INFO][3830] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.106 [INFO][3830] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.111 [INFO][3830] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.112 [INFO][3830] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.113 [INFO][3830] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.113 [INFO][3830] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.114 [INFO][3830] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752 May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.119 [INFO][3830] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.126 [INFO][3830] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.126 [INFO][3830] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" host="localhost" May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.126 [INFO][3830] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:13.147328 env[1200]: 2025-05-13 00:43:13.126 [INFO][3830] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" HandleID="k8s-pod-network.a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.129 [INFO][3794] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"4eec60e7-c4b0-4219-aef2-0fcb74419d40", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-4dq6p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida02813bc73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.130 [INFO][3794] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.130 [INFO][3794] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calida02813bc73 ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.134 [INFO][3794] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.134 [INFO][3794] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"4eec60e7-c4b0-4219-aef2-0fcb74419d40", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752", Pod:"coredns-668d6bf9bc-4dq6p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida02813bc73", MAC:"66:9f:44:4f:77:4e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.147951 env[1200]: 2025-05-13 00:43:13.145 [INFO][3794] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752" Namespace="kube-system" Pod="coredns-668d6bf9bc-4dq6p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:13.152000 audit[3913]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:13.152000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffd432a4ca0 a2=0 a3=7ffd432a4c8c items=0 ppid=3175 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.152000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:13.166204 env[1200]: time="2025-05-13T00:43:13.166140359Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:13.166363 env[1200]: time="2025-05-13T00:43:13.166180675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:13.166363 env[1200]: time="2025-05-13T00:43:13.166191174Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:13.166483 env[1200]: time="2025-05-13T00:43:13.166412079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752 pid=3925 runtime=io.containerd.runc.v2 May 13 00:43:13.171890 kubelet[1939]: E0513 00:43:13.171858 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:13.179169 systemd[1]: Started cri-containerd-a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752.scope. May 13 00:43:13.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.189000 audit: BPF prog-id=171 op=LOAD May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3925 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303864613163353962623565613838623363666461633465313737 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3925 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303864613163353962623565613838623363666461633465313737 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit: BPF prog-id=172 op=LOAD May 13 00:43:13.190000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d4430 items=0 ppid=3925 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303864613163353962623565613838623363666461633465313737 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit: BPF prog-id=173 op=LOAD May 13 00:43:13.190000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d4478 items=0 ppid=3925 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303864613163353962623565613838623363666461633465313737 May 13 00:43:13.190000 audit: BPF prog-id=173 op=UNLOAD May 13 00:43:13.190000 audit: BPF prog-id=172 op=UNLOAD May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.190000 audit: BPF prog-id=174 op=LOAD May 13 00:43:13.190000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d4888 items=0 ppid=3925 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303864613163353962623565613838623363666461633465313737 May 13 00:43:13.191676 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:13.215603 env[1200]: time="2025-05-13T00:43:13.215557381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-4dq6p,Uid:4eec60e7-c4b0-4219-aef2-0fcb74419d40,Namespace:kube-system,Attempt:1,} returns sandbox id \"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752\"" May 13 00:43:13.216200 kubelet[1939]: E0513 00:43:13.216176 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:13.217782 env[1200]: time="2025-05-13T00:43:13.217715865Z" level=info msg="CreateContainer within sandbox \"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:43:13.235245 env[1200]: time="2025-05-13T00:43:13.235190825Z" level=info msg="CreateContainer within sandbox \"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1b6a8112efc648dd4c7c9b77ac220cce5b656137fc69b275ab7a8fef0960d737\"" May 13 00:43:13.235845 env[1200]: time="2025-05-13T00:43:13.235817071Z" level=info msg="StartContainer for \"1b6a8112efc648dd4c7c9b77ac220cce5b656137fc69b275ab7a8fef0960d737\"" May 13 00:43:13.245862 systemd-networkd[1021]: cali08a9e9c51c2: Link UP May 13 00:43:13.247757 systemd-networkd[1021]: cali08a9e9c51c2: Gained carrier May 13 00:43:13.248538 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali08a9e9c51c2: link becomes ready May 13 00:43:13.249530 systemd[1]: Started cri-containerd-1b6a8112efc648dd4c7c9b77ac220cce5b656137fc69b275ab7a8fef0960d737.scope. May 13 00:43:13.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit: BPF prog-id=175 op=LOAD May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3925 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366138313132656663363438646434633763396237376163323230 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3925 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366138313132656663363438646434633763396237376163323230 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit: BPF prog-id=176 op=LOAD May 13 00:43:13.261000 audit[3967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002adae0 items=0 ppid=3925 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366138313132656663363438646434633763396237376163323230 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.261000 audit: BPF prog-id=177 op=LOAD May 13 00:43:13.261000 audit[3967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002adb28 items=0 ppid=3925 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366138313132656663363438646434633763396237376163323230 May 13 00:43:13.262000 audit: BPF prog-id=177 op=UNLOAD May 13 00:43:13.262000 audit: BPF prog-id=176 op=UNLOAD May 13 00:43:13.262000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { perfmon } for pid=3967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit[3967]: AVC avc: denied { bpf } for pid=3967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.262000 audit: BPF prog-id=178 op=LOAD May 13 00:43:13.262000 audit[3967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002adf38 items=0 ppid=3925 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366138313132656663363438646434633763396237376163323230 May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:12.983 [INFO][3806] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0 calico-apiserver-5bb6dfd48b- calico-apiserver ab9bc083-4c3d-4292-b3b3-19dedcfac5d7 921 0 2025-05-13 00:42:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bb6dfd48b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5bb6dfd48b-xqg2g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali08a9e9c51c2 [] []}} ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:12.983 [INFO][3806] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.027 [INFO][3837] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" HandleID="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.104 [INFO][3837] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" HandleID="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030d750), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5bb6dfd48b-xqg2g", "timestamp":"2025-05-13 00:43:13.027672877 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.104 [INFO][3837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.126 [INFO][3837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.127 [INFO][3837] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.203 [INFO][3837] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.207 [INFO][3837] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.215 [INFO][3837] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.217 [INFO][3837] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.219 [INFO][3837] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.219 [INFO][3837] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.222 [INFO][3837] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833 May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.228 [INFO][3837] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.239 [INFO][3837] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.240 [INFO][3837] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" host="localhost" May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.240 [INFO][3837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:13.263755 env[1200]: 2025-05-13 00:43:13.240 [INFO][3837] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" HandleID="k8s-pod-network.602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.242 [INFO][3806] cni-plugin/k8s.go 386: Populated endpoint ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5bb6dfd48b-xqg2g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali08a9e9c51c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.243 [INFO][3806] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.243 [INFO][3806] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali08a9e9c51c2 ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.248 [INFO][3806] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.248 [INFO][3806] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833", Pod:"calico-apiserver-5bb6dfd48b-xqg2g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali08a9e9c51c2", MAC:"a2:c7:06:9f:6f:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.264223 env[1200]: 2025-05-13 00:43:13.260 [INFO][3806] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833" Namespace="calico-apiserver" Pod="calico-apiserver-5bb6dfd48b-xqg2g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:13.270000 audit[4005]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:13.270000 audit[4005]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffe53bbfb30 a2=0 a3=7ffe53bbfb1c items=0 ppid=3175 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.270000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:13.276167 env[1200]: time="2025-05-13T00:43:13.276123422Z" level=info msg="StartContainer for \"1b6a8112efc648dd4c7c9b77ac220cce5b656137fc69b275ab7a8fef0960d737\" returns successfully" May 13 00:43:13.283205 env[1200]: time="2025-05-13T00:43:13.283131424Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:13.283205 env[1200]: time="2025-05-13T00:43:13.283176910Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:13.283205 env[1200]: time="2025-05-13T00:43:13.283187860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:13.283454 env[1200]: time="2025-05-13T00:43:13.283383338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833 pid=4018 runtime=io.containerd.runc.v2 May 13 00:43:13.287000 audit[3979]: AVC avc: denied { getattr } for pid=3979 comm="coredns" path="cgroup:[4026532425]" dev="nsfs" ino=4026532425 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c779 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:43:13.287000 audit[3979]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c00011ce08 a3=0 items=0 ppid=3925 pid=3979 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c779 key=(null) May 13 00:43:13.287000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:43:13.294484 systemd[1]: Started cri-containerd-602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833.scope. May 13 00:43:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit: BPF prog-id=179 op=LOAD May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326431313030656530356638633034366131313361643365376466 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326431313030656530356638633034366131313361643365376466 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit: BPF prog-id=180 op=LOAD May 13 00:43:13.309000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326431313030656530356638633034366131313361643365376466 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.309000 audit: BPF prog-id=181 op=LOAD May 13 00:43:13.309000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326431313030656530356638633034366131313361643365376466 May 13 00:43:13.310000 audit: BPF prog-id=181 op=UNLOAD May 13 00:43:13.310000 audit: BPF prog-id=180 op=UNLOAD May 13 00:43:13.310000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.310000 audit: BPF prog-id=182 op=LOAD May 13 00:43:13.310000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326431313030656530356638633034366131313361643365376466 May 13 00:43:13.311223 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:13.333701 env[1200]: time="2025-05-13T00:43:13.333634226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bb6dfd48b-xqg2g,Uid:ab9bc083-4c3d-4292-b3b3-19dedcfac5d7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833\"" May 13 00:43:13.540682 env[1200]: time="2025-05-13T00:43:13.540610807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:13.542607 env[1200]: time="2025-05-13T00:43:13.542554728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:13.543976 env[1200]: time="2025-05-13T00:43:13.543924801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:13.545147 env[1200]: time="2025-05-13T00:43:13.545097524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:13.545522 env[1200]: time="2025-05-13T00:43:13.545488127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:43:13.547122 env[1200]: time="2025-05-13T00:43:13.547083433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:43:13.547751 env[1200]: time="2025-05-13T00:43:13.547717835Z" level=info msg="CreateContainer within sandbox \"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:43:13.561763 env[1200]: time="2025-05-13T00:43:13.561713941Z" level=info msg="CreateContainer within sandbox \"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3a445923cb85c470fcb29fa17d5b801a441da8aa85161c06809028cc9831cb66\"" May 13 00:43:13.562158 env[1200]: time="2025-05-13T00:43:13.562129993Z" level=info msg="StartContainer for \"3a445923cb85c470fcb29fa17d5b801a441da8aa85161c06809028cc9831cb66\"" May 13 00:43:13.576613 systemd[1]: Started cri-containerd-3a445923cb85c470fcb29fa17d5b801a441da8aa85161c06809028cc9831cb66.scope. May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7faa7dbe9ba8 items=0 ppid=3565 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343435393233636238356334373066636232396661313764356238 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit: BPF prog-id=183 op=LOAD May 13 00:43:13.592000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003093a8 items=0 ppid=3565 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343435393233636238356334373066636232396661313764356238 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit: BPF prog-id=184 op=LOAD May 13 00:43:13.592000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003093f8 items=0 ppid=3565 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343435393233636238356334373066636232396661313764356238 May 13 00:43:13.592000 audit: BPF prog-id=184 op=UNLOAD May 13 00:43:13.592000 audit: BPF prog-id=183 op=UNLOAD May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.592000 audit: BPF prog-id=185 op=LOAD May 13 00:43:13.592000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000309488 items=0 ppid=3565 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343435393233636238356334373066636232396661313764356238 May 13 00:43:13.603805 env[1200]: time="2025-05-13T00:43:13.603760530Z" level=info msg="StartContainer for \"3a445923cb85c470fcb29fa17d5b801a441da8aa85161c06809028cc9831cb66\" returns successfully" May 13 00:43:13.723658 env[1200]: time="2025-05-13T00:43:13.723600276Z" level=info msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" iface="eth0" netns="/var/run/netns/cni-8fac5ecc-fbb6-d465-aadd-5f8bfe3b65b5" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" iface="eth0" netns="/var/run/netns/cni-8fac5ecc-fbb6-d465-aadd-5f8bfe3b65b5" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" iface="eth0" netns="/var/run/netns/cni-8fac5ecc-fbb6-d465-aadd-5f8bfe3b65b5" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.761 [INFO][4108] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.779 [INFO][4117] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.779 [INFO][4117] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.779 [INFO][4117] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.785 [WARNING][4117] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.785 [INFO][4117] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.786 [INFO][4117] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:13.789296 env[1200]: 2025-05-13 00:43:13.787 [INFO][4108] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:13.789738 env[1200]: time="2025-05-13T00:43:13.789492872Z" level=info msg="TearDown network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" successfully" May 13 00:43:13.789738 env[1200]: time="2025-05-13T00:43:13.789531856Z" level=info msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" returns successfully" May 13 00:43:13.790216 env[1200]: time="2025-05-13T00:43:13.790186805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5456bdc8dd-hs2rm,Uid:7b7c1ec1-9bea-4c58-a518-f3def3a292d1,Namespace:calico-system,Attempt:1,}" May 13 00:43:13.887203 systemd[1]: run-netns-cni\x2d8fac5ecc\x2dfbb6\x2dd465\x2daadd\x2d5f8bfe3b65b5.mount: Deactivated successfully. May 13 00:43:13.887277 systemd[1]: run-netns-cni\x2d17890fa1\x2dd3af\x2db35a\x2dd561\x2de9b8c3cb0e69.mount: Deactivated successfully. May 13 00:43:13.893605 systemd-networkd[1021]: calia26743555c3: Link UP May 13 00:43:13.895677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia26743555c3: link becomes ready May 13 00:43:13.895334 systemd-networkd[1021]: calia26743555c3: Gained carrier May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.827 [INFO][4126] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0 calico-kube-controllers-5456bdc8dd- calico-system 7b7c1ec1-9bea-4c58-a518-f3def3a292d1 945 0 2025-05-13 00:42:41 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5456bdc8dd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5456bdc8dd-hs2rm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia26743555c3 [] []}} ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.828 [INFO][4126] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.850 [INFO][4139] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" HandleID="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.857 [INFO][4139] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" HandleID="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000365d20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5456bdc8dd-hs2rm", "timestamp":"2025-05-13 00:43:13.850001937 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.857 [INFO][4139] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.857 [INFO][4139] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.857 [INFO][4139] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.859 [INFO][4139] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.862 [INFO][4139] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.866 [INFO][4139] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.867 [INFO][4139] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.869 [INFO][4139] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.869 [INFO][4139] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.871 [INFO][4139] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66 May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.874 [INFO][4139] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.879 [INFO][4139] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.879 [INFO][4139] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" host="localhost" May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.879 [INFO][4139] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:13.906276 env[1200]: 2025-05-13 00:43:13.879 [INFO][4139] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" HandleID="k8s-pod-network.8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.891 [INFO][4126] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0", GenerateName:"calico-kube-controllers-5456bdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"7b7c1ec1-9bea-4c58-a518-f3def3a292d1", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5456bdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5456bdc8dd-hs2rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia26743555c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.891 [INFO][4126] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.891 [INFO][4126] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia26743555c3 ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.895 [INFO][4126] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.896 [INFO][4126] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0", GenerateName:"calico-kube-controllers-5456bdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"7b7c1ec1-9bea-4c58-a518-f3def3a292d1", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5456bdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66", Pod:"calico-kube-controllers-5456bdc8dd-hs2rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia26743555c3", MAC:"7a:7e:db:dc:93:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:13.906977 env[1200]: 2025-05-13 00:43:13.903 [INFO][4126] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66" Namespace="calico-system" Pod="calico-kube-controllers-5456bdc8dd-hs2rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:13.913000 audit[4160]: NETFILTER_CFG table=filter:114 family=2 entries=56 op=nft_register_chain pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:43:13.913000 audit[4160]: SYSCALL arch=c000003e syscall=46 success=yes exit=26244 a0=3 a1=7fffc99f99c0 a2=0 a3=7fffc99f99ac items=0 ppid=3175 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:43:13.919726 env[1200]: time="2025-05-13T00:43:13.918012019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:13.919726 env[1200]: time="2025-05-13T00:43:13.918052465Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:13.919726 env[1200]: time="2025-05-13T00:43:13.918091869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:13.919726 env[1200]: time="2025-05-13T00:43:13.918257700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66 pid=4168 runtime=io.containerd.runc.v2 May 13 00:43:13.936332 systemd[1]: run-containerd-runc-k8s.io-8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66-runc.2bCFY5.mount: Deactivated successfully. May 13 00:43:13.941263 systemd[1]: Started cri-containerd-8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66.scope. May 13 00:43:13.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.65:22-10.0.0.1:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:13.942534 systemd[1]: Started sshd@13-10.0.0.65:22-10.0.0.1:54902.service. May 13 00:43:13.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit: BPF prog-id=186 op=LOAD May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336661313232373231353535666539376364323066343636633330 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336661313232373231353535666539376364323066343636633330 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit: BPF prog-id=187 op=LOAD May 13 00:43:13.952000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e4cf0 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336661313232373231353535666539376364323066343636633330 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit: BPF prog-id=188 op=LOAD May 13 00:43:13.952000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e4d38 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336661313232373231353535666539376364323066343636633330 May 13 00:43:13.952000 audit: BPF prog-id=188 op=UNLOAD May 13 00:43:13.952000 audit: BPF prog-id=187 op=UNLOAD May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:13.952000 audit: BPF prog-id=189 op=LOAD May 13 00:43:13.952000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e5148 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336661313232373231353535666539376364323066343636633330 May 13 00:43:13.953705 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:43:13.973512 env[1200]: time="2025-05-13T00:43:13.973463024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5456bdc8dd-hs2rm,Uid:7b7c1ec1-9bea-4c58-a518-f3def3a292d1,Namespace:calico-system,Attempt:1,} returns sandbox id \"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66\"" May 13 00:43:13.978000 audit[4187]: USER_ACCT pid=4187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:13.980168 sshd[4187]: Accepted publickey for core from 10.0.0.1 port 54902 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:13.979000 audit[4187]: CRED_ACQ pid=4187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:13.979000 audit[4187]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdead9fbb0 a2=3 a3=0 items=0 ppid=1 pid=4187 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.979000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:13.980851 sshd[4187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:13.984583 systemd-logind[1189]: New session 14 of user core. May 13 00:43:13.985256 systemd[1]: Started session-14.scope. May 13 00:43:13.988000 audit[4187]: USER_START pid=4187 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:13.989000 audit[4203]: CRED_ACQ pid=4203 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:14.097821 sshd[4187]: pam_unix(sshd:session): session closed for user core May 13 00:43:14.098000 audit[4187]: USER_END pid=4187 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:14.098000 audit[4187]: CRED_DISP pid=4187 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:14.099614 systemd[1]: sshd@13-10.0.0.65:22-10.0.0.1:54902.service: Deactivated successfully. May 13 00:43:14.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.65:22-10.0.0.1:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:14.100264 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:43:14.100854 systemd-logind[1189]: Session 14 logged out. Waiting for processes to exit. May 13 00:43:14.101512 systemd-logind[1189]: Removed session 14. May 13 00:43:14.178724 kubelet[1939]: E0513 00:43:14.178253 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:14.199449 kubelet[1939]: I0513 00:43:14.199369 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-4dq6p" podStartSLOduration=43.199348599 podStartE2EDuration="43.199348599s" podCreationTimestamp="2025-05-13 00:42:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:14.187774492 +0000 UTC m=+50.547646111" watchObservedRunningTime="2025-05-13 00:43:14.199348599 +0000 UTC m=+50.559220208" May 13 00:43:14.204000 audit[4214]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:14.204000 audit[4214]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff3fb7ce00 a2=0 a3=7fff3fb7cdec items=0 ppid=2128 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:14.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:14.208000 audit[4214]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:14.208000 audit[4214]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff3fb7ce00 a2=0 a3=7fff3fb7cdec items=0 ppid=2128 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:14.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:14.225000 audit[4216]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:14.225000 audit[4216]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffccd0ba140 a2=0 a3=7ffccd0ba12c items=0 ppid=2128 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:14.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:14.236000 audit[4216]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:14.236000 audit[4216]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffccd0ba140 a2=0 a3=7ffccd0ba12c items=0 ppid=2128 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:14.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:14.383835 systemd-networkd[1021]: cali08a9e9c51c2: Gained IPv6LL May 13 00:43:14.831596 systemd-networkd[1021]: calia7dcf9259a7: Gained IPv6LL May 13 00:43:15.023613 systemd-networkd[1021]: calida02813bc73: Gained IPv6LL May 13 00:43:15.151640 systemd-networkd[1021]: calia26743555c3: Gained IPv6LL May 13 00:43:15.181423 kubelet[1939]: E0513 00:43:15.181394 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:16.182979 kubelet[1939]: E0513 00:43:16.182895 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:17.688067 env[1200]: time="2025-05-13T00:43:17.687990696Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.689863 env[1200]: time="2025-05-13T00:43:17.689827774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.691613 env[1200]: time="2025-05-13T00:43:17.691577771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.692974 env[1200]: time="2025-05-13T00:43:17.692948845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.693559 env[1200]: time="2025-05-13T00:43:17.693510369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:43:17.694559 env[1200]: time="2025-05-13T00:43:17.694529753Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:43:17.699108 env[1200]: time="2025-05-13T00:43:17.699069688Z" level=info msg="CreateContainer within sandbox \"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:43:17.712067 env[1200]: time="2025-05-13T00:43:17.712009403Z" level=info msg="CreateContainer within sandbox \"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5af7fcd665b47b617f03d5bdb6b71ba37062c2b8f4df6b0002032ec512fa8f24\"" May 13 00:43:17.712570 env[1200]: time="2025-05-13T00:43:17.712512227Z" level=info msg="StartContainer for \"5af7fcd665b47b617f03d5bdb6b71ba37062c2b8f4df6b0002032ec512fa8f24\"" May 13 00:43:17.731726 systemd[1]: Started cri-containerd-5af7fcd665b47b617f03d5bdb6b71ba37062c2b8f4df6b0002032ec512fa8f24.scope. May 13 00:43:17.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.741000 audit: BPF prog-id=190 op=LOAD May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3871 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:17.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663766636436363562343762363137663033643562646236623731 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3871 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:17.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663766636436363562343762363137663033643562646236623731 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit: BPF prog-id=191 op=LOAD May 13 00:43:17.742000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cdd10 items=0 ppid=3871 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:17.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663766636436363562343762363137663033643562646236623731 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit: BPF prog-id=192 op=LOAD May 13 00:43:17.742000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cdd58 items=0 ppid=3871 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:17.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663766636436363562343762363137663033643562646236623731 May 13 00:43:17.742000 audit: BPF prog-id=192 op=UNLOAD May 13 00:43:17.742000 audit: BPF prog-id=191 op=UNLOAD May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:17.742000 audit: BPF prog-id=193 op=LOAD May 13 00:43:17.742000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8168 items=0 ppid=3871 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:17.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663766636436363562343762363137663033643562646236623731 May 13 00:43:17.769965 env[1200]: time="2025-05-13T00:43:17.769919224Z" level=info msg="StartContainer for \"5af7fcd665b47b617f03d5bdb6b71ba37062c2b8f4df6b0002032ec512fa8f24\" returns successfully" May 13 00:43:18.095581 env[1200]: time="2025-05-13T00:43:18.095518764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:18.097287 env[1200]: time="2025-05-13T00:43:18.097244043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:18.098850 env[1200]: time="2025-05-13T00:43:18.098811827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:18.100146 env[1200]: time="2025-05-13T00:43:18.100118480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:18.100523 env[1200]: time="2025-05-13T00:43:18.100492212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:43:18.101686 env[1200]: time="2025-05-13T00:43:18.101398633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:43:18.102582 env[1200]: time="2025-05-13T00:43:18.102558260Z" level=info msg="CreateContainer within sandbox \"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:43:18.116260 env[1200]: time="2025-05-13T00:43:18.116203519Z" level=info msg="CreateContainer within sandbox \"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1e28691af1b0986400b1e1267cc1c573d603a8ef6f4db5598a93fba902944000\"" May 13 00:43:18.116787 env[1200]: time="2025-05-13T00:43:18.116752560Z" level=info msg="StartContainer for \"1e28691af1b0986400b1e1267cc1c573d603a8ef6f4db5598a93fba902944000\"" May 13 00:43:18.131212 systemd[1]: Started cri-containerd-1e28691af1b0986400b1e1267cc1c573d603a8ef6f4db5598a93fba902944000.scope. May 13 00:43:18.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.146093 kernel: kauditd_printk_skb: 413 callbacks suppressed May 13 00:43:18.146149 kernel: audit: type=1400 audit(1747096998.144:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157647 kernel: audit: type=1400 audit(1747096998.144:1329): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157837 kernel: audit: type=1400 audit(1747096998.144:1330): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157866 kernel: audit: type=1400 audit(1747096998.144:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.161084 kernel: audit: type=1400 audit(1747096998.144:1332): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.164120 kernel: audit: type=1400 audit(1747096998.144:1333): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.167170 kernel: audit: type=1400 audit(1747096998.144:1334): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.170187 kernel: audit: type=1400 audit(1747096998.144:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.173174 kernel: audit: type=1400 audit(1747096998.144:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.176127 kernel: audit: type=1400 audit(1747096998.148:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit: BPF prog-id=194 op=LOAD May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4018 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165323836393161663162303938363430306231653132363763633163 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=4018 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165323836393161663162303938363430306231653132363763633163 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.148000 audit: BPF prog-id=195 op=LOAD May 13 00:43:18.148000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000331d40 items=0 ppid=4018 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165323836393161663162303938363430306231653132363763633163 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.154000 audit: BPF prog-id=196 op=LOAD May 13 00:43:18.154000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000331d88 items=0 ppid=4018 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165323836393161663162303938363430306231653132363763633163 May 13 00:43:18.157000 audit: BPF prog-id=196 op=UNLOAD May 13 00:43:18.157000 audit: BPF prog-id=195 op=UNLOAD May 13 00:43:18.157000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:18.157000 audit: BPF prog-id=197 op=LOAD May 13 00:43:18.157000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000398198 items=0 ppid=4018 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165323836393161663162303938363430306231653132363763633163 May 13 00:43:18.203177 env[1200]: time="2025-05-13T00:43:18.203132936Z" level=info msg="StartContainer for \"1e28691af1b0986400b1e1267cc1c573d603a8ef6f4db5598a93fba902944000\" returns successfully" May 13 00:43:18.206380 kubelet[1939]: I0513 00:43:18.206152 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-bj9md" podStartSLOduration=32.656682168 podStartE2EDuration="37.206134502s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:43:13.144778949 +0000 UTC m=+49.504650568" lastFinishedPulling="2025-05-13 00:43:17.694231283 +0000 UTC m=+54.054102902" observedRunningTime="2025-05-13 00:43:18.205736455 +0000 UTC m=+54.565608064" watchObservedRunningTime="2025-05-13 00:43:18.206134502 +0000 UTC m=+54.566006122" May 13 00:43:18.219000 audit[4302]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:18.219000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffc82f3b00 a2=0 a3=7fffc82f3aec items=0 ppid=2128 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.219000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:18.226000 audit[4302]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:18.226000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffc82f3b00 a2=0 a3=7fffc82f3aec items=0 ppid=2128 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:18.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:18.650000 audit[4246]: AVC avc: denied { watch } for pid=4246 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_42_57.3079557963/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c451 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c237,c451 tclass=file permissive=0 May 13 00:43:18.650000 audit[4246]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c5a3e0 a2=fc6 a3=0 items=0 ppid=3871 pid=4246 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c451 key=(null) May 13 00:43:18.650000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:43:18.710314 systemd[1]: run-containerd-runc-k8s.io-5af7fcd665b47b617f03d5bdb6b71ba37062c2b8f4df6b0002032ec512fa8f24-runc.RHk3oc.mount: Deactivated successfully. May 13 00:43:19.102046 systemd[1]: Started sshd@14-10.0.0.65:22-10.0.0.1:54914.service. May 13 00:43:19.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.65:22-10.0.0.1:54914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:19.147000 audit[4309]: USER_ACCT pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.148886 sshd[4309]: Accepted publickey for core from 10.0.0.1 port 54914 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:19.148000 audit[4309]: CRED_ACQ pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.148000 audit[4309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaf3f1f40 a2=3 a3=0 items=0 ppid=1 pid=4309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:19.148000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:19.149620 sshd[4309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:19.153471 systemd-logind[1189]: New session 15 of user core. May 13 00:43:19.153886 systemd[1]: Started session-15.scope. May 13 00:43:19.158000 audit[4309]: USER_START pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.159000 audit[4311]: CRED_ACQ pid=4311 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.194027 kubelet[1939]: I0513 00:43:19.193980 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:43:19.203864 kubelet[1939]: I0513 00:43:19.203793 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bb6dfd48b-xqg2g" podStartSLOduration=33.43742468 podStartE2EDuration="38.203772777s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:43:13.334890055 +0000 UTC m=+49.694761674" lastFinishedPulling="2025-05-13 00:43:18.101238142 +0000 UTC m=+54.461109771" observedRunningTime="2025-05-13 00:43:19.202906051 +0000 UTC m=+55.562777680" watchObservedRunningTime="2025-05-13 00:43:19.203772777 +0000 UTC m=+55.563644417" May 13 00:43:19.216000 audit[4320]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:19.216000 audit[4320]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd2fd716c0 a2=0 a3=7ffd2fd716ac items=0 ppid=2128 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:19.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:19.226000 audit[4320]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:19.226000 audit[4320]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2fd716c0 a2=0 a3=7ffd2fd716ac items=0 ppid=2128 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:19.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:19.278533 sshd[4309]: pam_unix(sshd:session): session closed for user core May 13 00:43:19.279000 audit[4309]: USER_END pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.279000 audit[4309]: CRED_DISP pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:19.280969 systemd[1]: sshd@14-10.0.0.65:22-10.0.0.1:54914.service: Deactivated successfully. May 13 00:43:19.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.65:22-10.0.0.1:54914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:19.281809 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:43:19.282401 systemd-logind[1189]: Session 15 logged out. Waiting for processes to exit. May 13 00:43:19.283404 systemd-logind[1189]: Removed session 15. May 13 00:43:19.449000 audit[4285]: AVC avc: denied { watch } for pid=4285 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_42_57.1218551183/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c829 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c492,c829 tclass=file permissive=0 May 13 00:43:19.449000 audit[4285]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b2c420 a2=fc6 a3=0 items=0 ppid=4018 pid=4285 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c829 key=(null) May 13 00:43:19.449000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:43:20.195741 kubelet[1939]: I0513 00:43:20.195691 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:43:21.181000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.181000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.181000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ae01b0 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:21.181000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001819620 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:21.181000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:21.181000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:21.243000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.243000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.243000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.243000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.243000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c004782750 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.243000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00132c3f0 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.243000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004823d20 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.243000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00da38e10 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.244000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.244000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00f6ebde0 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.249000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:21.249000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c004782900 a2=fc6 a3=0 items=0 ppid=1641 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c251 key=(null) May 13 00:43:21.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:21.332112 env[1200]: time="2025-05-13T00:43:21.332072788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:21.360440 env[1200]: time="2025-05-13T00:43:21.360375696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:21.379966 env[1200]: time="2025-05-13T00:43:21.379919924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:21.382405 env[1200]: time="2025-05-13T00:43:21.382380793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:21.382886 env[1200]: time="2025-05-13T00:43:21.382816992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:43:21.383966 env[1200]: time="2025-05-13T00:43:21.383936925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:43:21.384737 env[1200]: time="2025-05-13T00:43:21.384708102Z" level=info msg="CreateContainer within sandbox \"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:43:21.623629 env[1200]: time="2025-05-13T00:43:21.623555768Z" level=info msg="CreateContainer within sandbox \"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"538be10a2ca06cc3c0a4d131de2ad025cc0e0911db21586f7cf8f247cb774826\"" May 13 00:43:21.624184 env[1200]: time="2025-05-13T00:43:21.624146336Z" level=info msg="StartContainer for \"538be10a2ca06cc3c0a4d131de2ad025cc0e0911db21586f7cf8f247cb774826\"" May 13 00:43:21.640652 systemd[1]: Started cri-containerd-538be10a2ca06cc3c0a4d131de2ad025cc0e0911db21586f7cf8f247cb774826.scope. May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f72904912d8 items=0 ppid=3565 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:21.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533386265313061326361303663633363306134643133316465326164 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.652000 audit: BPF prog-id=198 op=LOAD May 13 00:43:21.652000 audit[4337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027feb8 items=0 ppid=3565 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:21.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533386265313061326361303663633363306134643133316465326164 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit: BPF prog-id=199 op=LOAD May 13 00:43:21.653000 audit[4337]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027ff08 items=0 ppid=3565 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:21.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533386265313061326361303663633363306134643133316465326164 May 13 00:43:21.653000 audit: BPF prog-id=199 op=UNLOAD May 13 00:43:21.653000 audit: BPF prog-id=198 op=UNLOAD May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { perfmon } for pid=4337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit[4337]: AVC avc: denied { bpf } for pid=4337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:21.653000 audit: BPF prog-id=200 op=LOAD May 13 00:43:21.653000 audit[4337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027ff98 items=0 ppid=3565 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:21.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533386265313061326361303663633363306134643133316465326164 May 13 00:43:21.836279 kubelet[1939]: I0513 00:43:21.836236 1939 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:43:21.836829 env[1200]: time="2025-05-13T00:43:21.836439225Z" level=info msg="StartContainer for \"538be10a2ca06cc3c0a4d131de2ad025cc0e0911db21586f7cf8f247cb774826\" returns successfully" May 13 00:43:21.839190 kubelet[1939]: I0513 00:43:21.839161 1939 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:43:22.211839 kubelet[1939]: I0513 00:43:22.211771 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xcl47" podStartSLOduration=30.694072603 podStartE2EDuration="41.2117537s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:43:10.866150159 +0000 UTC m=+47.226021778" lastFinishedPulling="2025-05-13 00:43:21.383831256 +0000 UTC m=+57.743702875" observedRunningTime="2025-05-13 00:43:22.211623306 +0000 UTC m=+58.571494925" watchObservedRunningTime="2025-05-13 00:43:22.2117537 +0000 UTC m=+58.571625319" May 13 00:43:23.708788 env[1200]: time="2025-05-13T00:43:23.708733029Z" level=info msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.747 [WARNING][4383] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xcl47-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e567def1-96f2-4f21-9272-da1b9fb80faf", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233", Pod:"csi-node-driver-xcl47", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6f55846bfb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.748 [INFO][4383] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.748 [INFO][4383] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" iface="eth0" netns="" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.748 [INFO][4383] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.748 [INFO][4383] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.773 [INFO][4394] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.773 [INFO][4394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.773 [INFO][4394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.778 [WARNING][4394] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.778 [INFO][4394] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.780 [INFO][4394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:23.783383 env[1200]: 2025-05-13 00:43:23.781 [INFO][4383] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.783989 env[1200]: time="2025-05-13T00:43:23.783399216Z" level=info msg="TearDown network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" successfully" May 13 00:43:23.783989 env[1200]: time="2025-05-13T00:43:23.783447196Z" level=info msg="StopPodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" returns successfully" May 13 00:43:23.784072 env[1200]: time="2025-05-13T00:43:23.784027886Z" level=info msg="RemovePodSandbox for \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" May 13 00:43:23.784113 env[1200]: time="2025-05-13T00:43:23.784073091Z" level=info msg="Forcibly stopping sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\"" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.817 [WARNING][4416] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xcl47-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e567def1-96f2-4f21-9272-da1b9fb80faf", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5dbefb07e217f035682c1bc2285c6b08ea71c03d84a28a6b0b7e6aedf888233", Pod:"csi-node-driver-xcl47", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6f55846bfb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.817 [INFO][4416] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.817 [INFO][4416] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" iface="eth0" netns="" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.817 [INFO][4416] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.817 [INFO][4416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.854 [INFO][4424] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.855 [INFO][4424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.855 [INFO][4424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.861 [WARNING][4424] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.861 [INFO][4424] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" HandleID="k8s-pod-network.f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" Workload="localhost-k8s-csi--node--driver--xcl47-eth0" May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.862 [INFO][4424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:23.865839 env[1200]: 2025-05-13 00:43:23.864 [INFO][4416] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8" May 13 00:43:23.866475 env[1200]: time="2025-05-13T00:43:23.865898185Z" level=info msg="TearDown network for sandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" successfully" May 13 00:43:23.958030 env[1200]: time="2025-05-13T00:43:23.957966967Z" level=info msg="RemovePodSandbox \"f87cece8a06a42eb51580dc3d56183bd3c8a505d5936a321366f5e164c550fa8\" returns successfully" May 13 00:43:23.958766 env[1200]: time="2025-05-13T00:43:23.958709861Z" level=info msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:23.993 [WARNING][4449] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"4eec60e7-c4b0-4219-aef2-0fcb74419d40", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752", Pod:"coredns-668d6bf9bc-4dq6p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida02813bc73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:23.993 [INFO][4449] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:23.993 [INFO][4449] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" iface="eth0" netns="" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:23.993 [INFO][4449] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:23.993 [INFO][4449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.019 [INFO][4457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.019 [INFO][4457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.020 [INFO][4457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.025 [WARNING][4457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.025 [INFO][4457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.026 [INFO][4457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.030132 env[1200]: 2025-05-13 00:43:24.028 [INFO][4449] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.030660 env[1200]: time="2025-05-13T00:43:24.030160722Z" level=info msg="TearDown network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" successfully" May 13 00:43:24.030660 env[1200]: time="2025-05-13T00:43:24.030198452Z" level=info msg="StopPodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" returns successfully" May 13 00:43:24.030925 env[1200]: time="2025-05-13T00:43:24.030886965Z" level=info msg="RemovePodSandbox for \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" May 13 00:43:24.031027 env[1200]: time="2025-05-13T00:43:24.030930757Z" level=info msg="Forcibly stopping sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\"" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.071 [WARNING][4480] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"4eec60e7-c4b0-4219-aef2-0fcb74419d40", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a208da1c59bb5ea88b3cfdac4e177944b3c1cbb87f1d3d243ec261333dc4b752", Pod:"coredns-668d6bf9bc-4dq6p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida02813bc73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.071 [INFO][4480] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.071 [INFO][4480] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" iface="eth0" netns="" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.071 [INFO][4480] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.071 [INFO][4480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.095 [INFO][4488] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.095 [INFO][4488] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.095 [INFO][4488] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.100 [WARNING][4488] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.101 [INFO][4488] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" HandleID="k8s-pod-network.1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" Workload="localhost-k8s-coredns--668d6bf9bc--4dq6p-eth0" May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.102 [INFO][4488] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.105462 env[1200]: 2025-05-13 00:43:24.103 [INFO][4480] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea" May 13 00:43:24.105897 env[1200]: time="2025-05-13T00:43:24.105487663Z" level=info msg="TearDown network for sandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" successfully" May 13 00:43:24.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.65:22-10.0.0.1:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:24.284255 kernel: kauditd_printk_skb: 143 callbacks suppressed May 13 00:43:24.284307 kernel: audit: type=1130 audit(1747097004.282:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.65:22-10.0.0.1:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:24.283068 systemd[1]: Started sshd@15-10.0.0.65:22-10.0.0.1:55358.service. May 13 00:43:24.329398 env[1200]: time="2025-05-13T00:43:24.329317451Z" level=info msg="RemovePodSandbox \"1f8a57359a9876b3fa526fcbe4aac31e0e395a1282bce7c6c29a008d94fe3bea\" returns successfully" May 13 00:43:24.329919 env[1200]: time="2025-05-13T00:43:24.329890376Z" level=info msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" May 13 00:43:24.354000 audit[4497]: USER_ACCT pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.356676 sshd[4497]: Accepted publickey for core from 10.0.0.1 port 55358 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:24.359667 kernel: audit: type=1101 audit(1747097004.354:1376): pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.359728 kernel: audit: type=1103 audit(1747097004.359:1377): pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.359000 audit[4497]: CRED_ACQ pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.360011 sshd[4497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:24.365344 kernel: audit: type=1006 audit(1747097004.359:1378): pid=4497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:43:24.359000 audit[4497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde797c10 a2=3 a3=0 items=0 ppid=1 pid=4497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:24.370472 kernel: audit: type=1300 audit(1747097004.359:1378): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde797c10 a2=3 a3=0 items=0 ppid=1 pid=4497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:24.359000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:24.372481 kernel: audit: type=1327 audit(1747097004.359:1378): proctitle=737368643A20636F7265205B707269765D May 13 00:43:24.375199 systemd[1]: Started session-16.scope. May 13 00:43:24.376400 systemd-logind[1189]: New session 16 of user core. May 13 00:43:24.380000 audit[4497]: USER_START pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.389125 kernel: audit: type=1105 audit(1747097004.380:1379): pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.389171 kernel: audit: type=1103 audit(1747097004.382:1380): pid=4521 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.382000 audit[4521]: CRED_ACQ pid=4521 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.383 [WARNING][4513] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0", GenerateName:"calico-kube-controllers-5456bdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"7b7c1ec1-9bea-4c58-a518-f3def3a292d1", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5456bdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66", Pod:"calico-kube-controllers-5456bdc8dd-hs2rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia26743555c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.383 [INFO][4513] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.383 [INFO][4513] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" iface="eth0" netns="" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.383 [INFO][4513] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.383 [INFO][4513] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.405 [INFO][4523] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.405 [INFO][4523] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.405 [INFO][4523] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.411 [WARNING][4523] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.411 [INFO][4523] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.412 [INFO][4523] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.415888 env[1200]: 2025-05-13 00:43:24.414 [INFO][4513] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.416378 env[1200]: time="2025-05-13T00:43:24.416343271Z" level=info msg="TearDown network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" successfully" May 13 00:43:24.416470 env[1200]: time="2025-05-13T00:43:24.416450031Z" level=info msg="StopPodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" returns successfully" May 13 00:43:24.417062 env[1200]: time="2025-05-13T00:43:24.417025020Z" level=info msg="RemovePodSandbox for \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" May 13 00:43:24.417107 env[1200]: time="2025-05-13T00:43:24.417067740Z" level=info msg="Forcibly stopping sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\"" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.453 [WARNING][4545] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0", GenerateName:"calico-kube-controllers-5456bdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"7b7c1ec1-9bea-4c58-a518-f3def3a292d1", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5456bdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66", Pod:"calico-kube-controllers-5456bdc8dd-hs2rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia26743555c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.453 [INFO][4545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.453 [INFO][4545] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" iface="eth0" netns="" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.453 [INFO][4545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.453 [INFO][4545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.475 [INFO][4557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.475 [INFO][4557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.475 [INFO][4557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.481 [WARNING][4557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.481 [INFO][4557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" HandleID="k8s-pod-network.fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" Workload="localhost-k8s-calico--kube--controllers--5456bdc8dd--hs2rm-eth0" May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.482 [INFO][4557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.486482 env[1200]: 2025-05-13 00:43:24.484 [INFO][4545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa" May 13 00:43:24.486929 env[1200]: time="2025-05-13T00:43:24.486512431Z" level=info msg="TearDown network for sandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" successfully" May 13 00:43:24.490903 env[1200]: time="2025-05-13T00:43:24.490435995Z" level=info msg="RemovePodSandbox \"fefe997af3713535c3936e676a5a29391cd59c66a654ccf3f7183948942d6bfa\" returns successfully" May 13 00:43:24.491166 env[1200]: time="2025-05-13T00:43:24.491136520Z" level=info msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" May 13 00:43:24.548514 sshd[4497]: pam_unix(sshd:session): session closed for user core May 13 00:43:24.558549 kernel: audit: type=1106 audit(1747097004.550:1381): pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.558617 kernel: audit: type=1104 audit(1747097004.551:1382): pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.550000 audit[4497]: USER_END pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.551000 audit[4497]: CRED_DISP pid=4497 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:24.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.65:22-10.0.0.1:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:24.553148 systemd[1]: sshd@15-10.0.0.65:22-10.0.0.1:55358.service: Deactivated successfully. May 13 00:43:24.553866 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:43:24.554769 systemd-logind[1189]: Session 16 logged out. Waiting for processes to exit. May 13 00:43:24.555530 systemd-logind[1189]: Removed session 16. May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.531 [WARNING][4584] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d76zx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6fddd02c-1fa4-43a2-8ef4-f392621d04a3", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af", Pod:"coredns-668d6bf9bc-d76zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5871d0f7585", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.532 [INFO][4584] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.532 [INFO][4584] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" iface="eth0" netns="" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.532 [INFO][4584] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.532 [INFO][4584] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.564 [INFO][4592] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.564 [INFO][4592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.564 [INFO][4592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.575 [WARNING][4592] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.575 [INFO][4592] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.576 [INFO][4592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.580036 env[1200]: 2025-05-13 00:43:24.578 [INFO][4584] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.580587 env[1200]: time="2025-05-13T00:43:24.580063808Z" level=info msg="TearDown network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" successfully" May 13 00:43:24.580587 env[1200]: time="2025-05-13T00:43:24.580094837Z" level=info msg="StopPodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" returns successfully" May 13 00:43:24.580677 env[1200]: time="2025-05-13T00:43:24.580639920Z" level=info msg="RemovePodSandbox for \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" May 13 00:43:24.580715 env[1200]: time="2025-05-13T00:43:24.580681488Z" level=info msg="Forcibly stopping sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\"" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.619 [WARNING][4617] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d76zx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6fddd02c-1fa4-43a2-8ef4-f392621d04a3", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0be728acc8fcf2fe295b808c89f4e94f418d794ca8f4c26c072fb71ab1a018af", Pod:"coredns-668d6bf9bc-d76zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5871d0f7585", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.620 [INFO][4617] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.620 [INFO][4617] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" iface="eth0" netns="" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.620 [INFO][4617] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.620 [INFO][4617] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.640 [INFO][4625] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.640 [INFO][4625] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.640 [INFO][4625] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.646 [WARNING][4625] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.646 [INFO][4625] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" HandleID="k8s-pod-network.c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" Workload="localhost-k8s-coredns--668d6bf9bc--d76zx-eth0" May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.647 [INFO][4625] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.650405 env[1200]: 2025-05-13 00:43:24.648 [INFO][4617] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd" May 13 00:43:24.650856 env[1200]: time="2025-05-13T00:43:24.650450778Z" level=info msg="TearDown network for sandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" successfully" May 13 00:43:24.654017 env[1200]: time="2025-05-13T00:43:24.653986445Z" level=info msg="RemovePodSandbox \"c46374125357a5d4f57e536f0aaa2368384534b07715c97eee8fb0a9fce2d2fd\" returns successfully" May 13 00:43:24.654592 env[1200]: time="2025-05-13T00:43:24.654544251Z" level=info msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.702 [WARNING][4649] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833", Pod:"calico-apiserver-5bb6dfd48b-xqg2g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali08a9e9c51c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.703 [INFO][4649] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.703 [INFO][4649] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" iface="eth0" netns="" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.703 [INFO][4649] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.703 [INFO][4649] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.727 [INFO][4657] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.727 [INFO][4657] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.728 [INFO][4657] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.737 [WARNING][4657] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.737 [INFO][4657] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.739 [INFO][4657] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.741898 env[1200]: 2025-05-13 00:43:24.740 [INFO][4649] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.742907 env[1200]: time="2025-05-13T00:43:24.741921861Z" level=info msg="TearDown network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" successfully" May 13 00:43:24.742907 env[1200]: time="2025-05-13T00:43:24.741957498Z" level=info msg="StopPodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" returns successfully" May 13 00:43:24.742907 env[1200]: time="2025-05-13T00:43:24.742399247Z" level=info msg="RemovePodSandbox for \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" May 13 00:43:24.742907 env[1200]: time="2025-05-13T00:43:24.742485018Z" level=info msg="Forcibly stopping sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\"" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.774 [WARNING][4680] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab9bc083-4c3d-4292-b3b3-19dedcfac5d7", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"602d1100ee05f8c046a113ad3e7dfdda1fabcf77bc716936db93d311a1ac7833", Pod:"calico-apiserver-5bb6dfd48b-xqg2g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali08a9e9c51c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.774 [INFO][4680] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.774 [INFO][4680] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" iface="eth0" netns="" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.774 [INFO][4680] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.774 [INFO][4680] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.803 [INFO][4688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.803 [INFO][4688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.803 [INFO][4688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.812 [WARNING][4688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.812 [INFO][4688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" HandleID="k8s-pod-network.7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--xqg2g-eth0" May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.813 [INFO][4688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:24.816122 env[1200]: 2025-05-13 00:43:24.814 [INFO][4680] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128" May 13 00:43:24.816938 env[1200]: time="2025-05-13T00:43:24.816904887Z" level=info msg="TearDown network for sandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" successfully" May 13 00:43:25.025924 env[1200]: time="2025-05-13T00:43:25.025820561Z" level=info msg="RemovePodSandbox \"7d1aecf60b871886a77d56705ae0e2d25b70db9ecc7a0f9cd94c33915e85d128\" returns successfully" May 13 00:43:25.028744 env[1200]: time="2025-05-13T00:43:25.028705986Z" level=info msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.064 [WARNING][4713] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"9786ed1e-5caa-4eec-97c3-22894c003af9", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a", Pod:"calico-apiserver-5bb6dfd48b-bj9md", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7dcf9259a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.064 [INFO][4713] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.064 [INFO][4713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" iface="eth0" netns="" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.064 [INFO][4713] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.064 [INFO][4713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.092 [INFO][4721] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.092 [INFO][4721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.092 [INFO][4721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.097 [WARNING][4721] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.097 [INFO][4721] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.099 [INFO][4721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:25.102350 env[1200]: 2025-05-13 00:43:25.100 [INFO][4713] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.102350 env[1200]: time="2025-05-13T00:43:25.102109412Z" level=info msg="TearDown network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" successfully" May 13 00:43:25.102350 env[1200]: time="2025-05-13T00:43:25.102138577Z" level=info msg="StopPodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" returns successfully" May 13 00:43:25.102871 env[1200]: time="2025-05-13T00:43:25.102627174Z" level=info msg="RemovePodSandbox for \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" May 13 00:43:25.102871 env[1200]: time="2025-05-13T00:43:25.102671266Z" level=info msg="Forcibly stopping sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\"" May 13 00:43:25.120016 env[1200]: time="2025-05-13T00:43:25.119974963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.122696 env[1200]: time="2025-05-13T00:43:25.122669741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.125444 env[1200]: time="2025-05-13T00:43:25.125412518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.128499 env[1200]: time="2025-05-13T00:43:25.128460549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.128917 env[1200]: time="2025-05-13T00:43:25.128876419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 00:43:25.142809 env[1200]: time="2025-05-13T00:43:25.142765206Z" level=info msg="CreateContainer within sandbox \"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:43:25.158348 env[1200]: time="2025-05-13T00:43:25.158270336Z" level=info msg="CreateContainer within sandbox \"8a3fa122721555fe97cd20f466c3062910653c2cc82c4df3f5d1e45a1a52ae66\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a7e0108f152f97edf5f19369f402d47ea774e3be371a8cff954aefd7ee9a2f7a\"" May 13 00:43:25.160117 env[1200]: time="2025-05-13T00:43:25.158968707Z" level=info msg="StartContainer for \"a7e0108f152f97edf5f19369f402d47ea774e3be371a8cff954aefd7ee9a2f7a\"" May 13 00:43:25.177441 systemd[1]: Started cri-containerd-a7e0108f152f97edf5f19369f402d47ea774e3be371a8cff954aefd7ee9a2f7a.scope. May 13 00:43:25.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.189000 audit: BPF prog-id=201 op=LOAD May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4168 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:25.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653031303866313532663937656466356631393336396634303264 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4168 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:25.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653031303866313532663937656466356631393336396634303264 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit: BPF prog-id=202 op=LOAD May 13 00:43:25.190000 audit[4769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027bdc0 items=0 ppid=4168 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:25.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653031303866313532663937656466356631393336396634303264 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.190000 audit: BPF prog-id=203 op=LOAD May 13 00:43:25.190000 audit[4769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027be08 items=0 ppid=4168 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:25.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653031303866313532663937656466356631393336396634303264 May 13 00:43:25.191000 audit: BPF prog-id=203 op=UNLOAD May 13 00:43:25.191000 audit: BPF prog-id=202 op=UNLOAD May 13 00:43:25.191000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:25.191000 audit: BPF prog-id=204 op=LOAD May 13 00:43:25.191000 audit[4769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8218 items=0 ppid=4168 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:25.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653031303866313532663937656466356631393336396634303264 May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.144 [WARNING][4743] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0", GenerateName:"calico-apiserver-5bb6dfd48b-", Namespace:"calico-apiserver", SelfLink:"", UID:"9786ed1e-5caa-4eec-97c3-22894c003af9", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bb6dfd48b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cb636e45279711e751581907bba841654cb1c3d200f27afdc112301b2e39f6a", Pod:"calico-apiserver-5bb6dfd48b-bj9md", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7dcf9259a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.144 [INFO][4743] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.144 [INFO][4743] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" iface="eth0" netns="" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.144 [INFO][4743] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.144 [INFO][4743] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.175 [INFO][4754] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.175 [INFO][4754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.175 [INFO][4754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.188 [WARNING][4754] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.188 [INFO][4754] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" HandleID="k8s-pod-network.06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" Workload="localhost-k8s-calico--apiserver--5bb6dfd48b--bj9md-eth0" May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.189 [INFO][4754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:43:25.193795 env[1200]: 2025-05-13 00:43:25.192 [INFO][4743] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae" May 13 00:43:25.194630 env[1200]: time="2025-05-13T00:43:25.193815950Z" level=info msg="TearDown network for sandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" successfully" May 13 00:43:25.197893 env[1200]: time="2025-05-13T00:43:25.197867154Z" level=info msg="RemovePodSandbox \"06344711ae4aef2b47db5a53c013912922844758e5fce561e06e9c2cee8d6bae\" returns successfully" May 13 00:43:25.216690 env[1200]: time="2025-05-13T00:43:25.216655075Z" level=info msg="StartContainer for \"a7e0108f152f97edf5f19369f402d47ea774e3be371a8cff954aefd7ee9a2f7a\" returns successfully" May 13 00:43:25.710000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:25.710000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:25.710000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001819880 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:25.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:25.710000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:25.710000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d8fe80 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:25.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:25.710000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d77100 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:25.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:25.715000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:25.715000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d77120 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c817 key=(null) May 13 00:43:25.715000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:26.288990 kubelet[1939]: I0513 00:43:26.288915 1939 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5456bdc8dd-hs2rm" podStartSLOduration=34.133734029 podStartE2EDuration="45.288898015s" podCreationTimestamp="2025-05-13 00:42:41 +0000 UTC" firstStartedPulling="2025-05-13 00:43:13.97466399 +0000 UTC m=+50.334535599" lastFinishedPulling="2025-05-13 00:43:25.129827976 +0000 UTC m=+61.489699585" observedRunningTime="2025-05-13 00:43:26.288389812 +0000 UTC m=+62.648261441" watchObservedRunningTime="2025-05-13 00:43:26.288898015 +0000 UTC m=+62.648769634" May 13 00:43:28.467810 kubelet[1939]: I0513 00:43:28.467768 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:43:28.618000 audit[4823]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:28.618000 audit[4823]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc11510d30 a2=0 a3=7ffc11510d1c items=0 ppid=2128 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:28.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:28.623000 audit[4823]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:28.623000 audit[4823]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc11510d30 a2=0 a3=7ffc11510d1c items=0 ppid=2128 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:28.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:29.552006 systemd[1]: Started sshd@16-10.0.0.65:22-10.0.0.1:55362.service. May 13 00:43:29.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.65:22-10.0.0.1:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:29.553169 kernel: kauditd_printk_skb: 76 callbacks suppressed May 13 00:43:29.553242 kernel: audit: type=1130 audit(1747097009.550:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.65:22-10.0.0.1:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:29.584000 audit[4831]: USER_ACCT pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.586544 sshd[4831]: Accepted publickey for core from 10.0.0.1 port 55362 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:29.588172 sshd[4831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:29.586000 audit[4831]: CRED_ACQ pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.591889 systemd-logind[1189]: New session 17 of user core. May 13 00:43:29.592849 systemd[1]: Started session-17.scope. May 13 00:43:29.594137 kernel: audit: type=1101 audit(1747097009.584:1409): pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.594195 kernel: audit: type=1103 audit(1747097009.586:1410): pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.594243 kernel: audit: type=1006 audit(1747097009.586:1411): pid=4831 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 00:43:29.586000 audit[4831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc49354c40 a2=3 a3=0 items=0 ppid=1 pid=4831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:29.600501 kernel: audit: type=1300 audit(1747097009.586:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc49354c40 a2=3 a3=0 items=0 ppid=1 pid=4831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:29.600546 kernel: audit: type=1327 audit(1747097009.586:1411): proctitle=737368643A20636F7265205B707269765D May 13 00:43:29.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:29.595000 audit[4831]: USER_START pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.606125 kernel: audit: type=1105 audit(1747097009.595:1412): pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.606175 kernel: audit: type=1103 audit(1747097009.596:1413): pid=4833 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.596000 audit[4833]: CRED_ACQ pid=4833 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.737404 sshd[4831]: pam_unix(sshd:session): session closed for user core May 13 00:43:29.736000 audit[4831]: USER_END pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.740020 systemd[1]: sshd@16-10.0.0.65:22-10.0.0.1:55362.service: Deactivated successfully. May 13 00:43:29.740737 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:43:29.741291 systemd-logind[1189]: Session 17 logged out. Waiting for processes to exit. May 13 00:43:29.742027 systemd-logind[1189]: Removed session 17. May 13 00:43:29.737000 audit[4831]: CRED_DISP pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.746093 kernel: audit: type=1106 audit(1747097009.736:1414): pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.746153 kernel: audit: type=1104 audit(1747097009.737:1415): pid=4831 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:29.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.65:22-10.0.0.1:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:34.742186 systemd[1]: Started sshd@17-10.0.0.65:22-10.0.0.1:41760.service. May 13 00:43:34.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.65:22-10.0.0.1:41760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:34.743429 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:43:34.743491 kernel: audit: type=1130 audit(1747097014.740:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.65:22-10.0.0.1:41760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:34.778000 audit[4849]: USER_ACCT pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.779918 sshd[4849]: Accepted publickey for core from 10.0.0.1 port 41760 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:34.782176 sshd[4849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:34.780000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.785891 systemd-logind[1189]: New session 18 of user core. May 13 00:43:34.787096 systemd[1]: Started session-18.scope. May 13 00:43:34.788035 kernel: audit: type=1101 audit(1747097014.778:1418): pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.788109 kernel: audit: type=1103 audit(1747097014.780:1419): pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.788133 kernel: audit: type=1006 audit(1747097014.780:1420): pid=4849 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 13 00:43:34.780000 audit[4849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedaf9ee30 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:34.794827 kernel: audit: type=1300 audit(1747097014.780:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedaf9ee30 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:34.794872 kernel: audit: type=1327 audit(1747097014.780:1420): proctitle=737368643A20636F7265205B707269765D May 13 00:43:34.780000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:34.791000 audit[4849]: USER_START pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.800893 kernel: audit: type=1105 audit(1747097014.791:1421): pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.800927 kernel: audit: type=1103 audit(1747097014.792:1422): pid=4851 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.792000 audit[4851]: CRED_ACQ pid=4851 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.934495 sshd[4849]: pam_unix(sshd:session): session closed for user core May 13 00:43:34.934000 audit[4849]: USER_END pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.938161 systemd[1]: sshd@17-10.0.0.65:22-10.0.0.1:41760.service: Deactivated successfully. May 13 00:43:34.938689 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:43:34.939197 systemd-logind[1189]: Session 18 logged out. Waiting for processes to exit. May 13 00:43:34.940039 systemd[1]: Started sshd@18-10.0.0.65:22-10.0.0.1:41770.service. May 13 00:43:34.934000 audit[4849]: CRED_DISP pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.940764 systemd-logind[1189]: Removed session 18. May 13 00:43:34.944541 kernel: audit: type=1106 audit(1747097014.934:1423): pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.944600 kernel: audit: type=1104 audit(1747097014.934:1424): pid=4849 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.65:22-10.0.0.1:41760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:34.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.65:22-10.0.0.1:41770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:34.970000 audit[4862]: USER_ACCT pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.971867 sshd[4862]: Accepted publickey for core from 10.0.0.1 port 41770 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:34.971000 audit[4862]: CRED_ACQ pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.971000 audit[4862]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e26e910 a2=3 a3=0 items=0 ppid=1 pid=4862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:34.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:34.973047 sshd[4862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:34.976209 systemd-logind[1189]: New session 19 of user core. May 13 00:43:34.976901 systemd[1]: Started session-19.scope. May 13 00:43:34.979000 audit[4862]: USER_START pid=4862 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:34.980000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.282564 sshd[4862]: pam_unix(sshd:session): session closed for user core May 13 00:43:35.282000 audit[4862]: USER_END pid=4862 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.282000 audit[4862]: CRED_DISP pid=4862 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.285804 systemd[1]: sshd@18-10.0.0.65:22-10.0.0.1:41770.service: Deactivated successfully. May 13 00:43:35.286324 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:43:35.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.65:22-10.0.0.1:41770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.286883 systemd-logind[1189]: Session 19 logged out. Waiting for processes to exit. May 13 00:43:35.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.65:22-10.0.0.1:41776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.287908 systemd[1]: Started sshd@19-10.0.0.65:22-10.0.0.1:41776.service. May 13 00:43:35.288799 systemd-logind[1189]: Removed session 19. May 13 00:43:35.318000 audit[4874]: USER_ACCT pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.319933 sshd[4874]: Accepted publickey for core from 10.0.0.1 port 41776 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:35.319000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.319000 audit[4874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff46cb4290 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:35.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:35.321056 sshd[4874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:35.324163 systemd-logind[1189]: New session 20 of user core. May 13 00:43:35.324966 systemd[1]: Started session-20.scope. May 13 00:43:35.327000 audit[4874]: USER_START pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:35.328000 audit[4876]: CRED_ACQ pid=4876 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.351000 audit[4888]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:36.351000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffe3190ca0 a2=0 a3=7fffe3190c8c items=0 ppid=2128 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:36.357000 audit[4888]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:36.357000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe3190ca0 a2=0 a3=0 items=0 ppid=2128 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:36.361625 sshd[4874]: pam_unix(sshd:session): session closed for user core May 13 00:43:36.361000 audit[4874]: USER_END pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.361000 audit[4874]: CRED_DISP pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.364238 systemd[1]: sshd@19-10.0.0.65:22-10.0.0.1:41776.service: Deactivated successfully. May 13 00:43:36.364833 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:43:36.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.65:22-10.0.0.1:41776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.365584 systemd-logind[1189]: Session 20 logged out. Waiting for processes to exit. May 13 00:43:36.366623 systemd[1]: Started sshd@20-10.0.0.65:22-10.0.0.1:41782.service. May 13 00:43:36.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.65:22-10.0.0.1:41782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.368154 systemd-logind[1189]: Removed session 20. May 13 00:43:36.370000 audit[4893]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:36.370000 audit[4893]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffc713eca0 a2=0 a3=7fffc713ec8c items=0 ppid=2128 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:36.375000 audit[4893]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:36.375000 audit[4893]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc713eca0 a2=0 a3=0 items=0 ppid=2128 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:36.402000 audit[4891]: USER_ACCT pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.403815 sshd[4891]: Accepted publickey for core from 10.0.0.1 port 41782 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:36.403000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.403000 audit[4891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcefd9ee50 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:36.404947 sshd[4891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:36.408915 systemd-logind[1189]: New session 21 of user core. May 13 00:43:36.409620 systemd[1]: Started session-21.scope. May 13 00:43:36.413000 audit[4891]: USER_START pid=4891 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.415000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.950379 sshd[4891]: pam_unix(sshd:session): session closed for user core May 13 00:43:36.950817 systemd[1]: Started sshd@21-10.0.0.65:22-10.0.0.1:41786.service. May 13 00:43:36.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.65:22-10.0.0.1:41786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.950000 audit[4891]: USER_END pid=4891 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.950000 audit[4891]: CRED_DISP pid=4891 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.65:22-10.0.0.1:41782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.953085 systemd[1]: sshd@20-10.0.0.65:22-10.0.0.1:41782.service: Deactivated successfully. May 13 00:43:36.953835 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:43:36.954552 systemd-logind[1189]: Session 21 logged out. Waiting for processes to exit. May 13 00:43:36.955319 systemd-logind[1189]: Removed session 21. May 13 00:43:36.987000 audit[4903]: USER_ACCT pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.989646 sshd[4903]: Accepted publickey for core from 10.0.0.1 port 41786 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:36.992000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:36.992000 audit[4903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84a5db50 a2=3 a3=0 items=0 ppid=1 pid=4903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.992000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:36.994501 sshd[4903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:36.998478 systemd-logind[1189]: New session 22 of user core. May 13 00:43:36.998789 systemd[1]: Started session-22.scope. May 13 00:43:37.001000 audit[4903]: USER_START pid=4903 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:37.002000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:37.139980 sshd[4903]: pam_unix(sshd:session): session closed for user core May 13 00:43:37.139000 audit[4903]: USER_END pid=4903 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:37.139000 audit[4903]: CRED_DISP pid=4903 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:37.142545 systemd[1]: sshd@21-10.0.0.65:22-10.0.0.1:41786.service: Deactivated successfully. May 13 00:43:37.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.65:22-10.0.0.1:41786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:37.143222 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:43:37.143732 systemd-logind[1189]: Session 22 logged out. Waiting for processes to exit. May 13 00:43:37.144336 systemd-logind[1189]: Removed session 22. May 13 00:43:38.722772 kubelet[1939]: E0513 00:43:38.722725 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:39.382273 kubelet[1939]: E0513 00:43:39.382225 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:41.722714 kubelet[1939]: E0513 00:43:41.722656 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:42.144610 systemd[1]: Started sshd@22-10.0.0.65:22-10.0.0.1:41794.service. May 13 00:43:42.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.65:22-10.0.0.1:41794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:42.145971 kernel: kauditd_printk_skb: 57 callbacks suppressed May 13 00:43:42.146103 kernel: audit: type=1130 audit(1747097022.144:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.65:22-10.0.0.1:41794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:42.178000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.178665 sshd[4940]: Accepted publickey for core from 10.0.0.1 port 41794 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:42.187286 kernel: audit: type=1101 audit(1747097022.178:1467): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.187451 kernel: audit: type=1103 audit(1747097022.182:1468): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.182000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.183646 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:42.188085 systemd-logind[1189]: New session 23 of user core. May 13 00:43:42.188500 systemd[1]: Started session-23.scope. May 13 00:43:42.182000 audit[4940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94784b60 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.196183 kernel: audit: type=1006 audit(1747097022.182:1469): pid=4940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:43:42.196256 kernel: audit: type=1300 audit(1747097022.182:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94784b60 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.196287 kernel: audit: type=1327 audit(1747097022.182:1469): proctitle=737368643A20636F7265205B707269765D May 13 00:43:42.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:42.194000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.201658 kernel: audit: type=1105 audit(1747097022.194:1470): pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.201814 kernel: audit: type=1103 audit(1747097022.195:1471): pid=4942 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.195000 audit[4942]: CRED_ACQ pid=4942 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.304116 sshd[4940]: pam_unix(sshd:session): session closed for user core May 13 00:43:42.304000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.306671 systemd[1]: sshd@22-10.0.0.65:22-10.0.0.1:41794.service: Deactivated successfully. May 13 00:43:42.307477 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:43:42.308254 systemd-logind[1189]: Session 23 logged out. Waiting for processes to exit. May 13 00:43:42.309003 systemd-logind[1189]: Removed session 23. May 13 00:43:42.304000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.312938 kernel: audit: type=1106 audit(1747097022.304:1472): pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.313004 kernel: audit: type=1104 audit(1747097022.304:1473): pid=4940 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:42.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.65:22-10.0.0.1:41794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:42.533289 kubelet[1939]: I0513 00:43:42.533234 1939 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:43:42.560000 audit[4954]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:42.560000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff8bd281f0 a2=0 a3=7fff8bd281dc items=0 ppid=2128 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:42.568000 audit[4954]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:42.568000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff8bd281f0 a2=0 a3=7fff8bd281dc items=0 ppid=2128 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:42.722848 kubelet[1939]: E0513 00:43:42.722811 1939 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:42.846000 audit[4956]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:42.846000 audit[4956]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc14d98400 a2=0 a3=7ffc14d983ec items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:42.855000 audit[4956]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:42.855000 audit[4956]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc14d98400 a2=0 a3=7ffc14d983ec items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:42.855000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:47.308993 systemd[1]: Started sshd@23-10.0.0.65:22-10.0.0.1:50616.service. May 13 00:43:47.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.65:22-10.0.0.1:50616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:47.310070 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 00:43:47.310135 kernel: audit: type=1130 audit(1747097027.308:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.65:22-10.0.0.1:50616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:47.339000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.339915 sshd[4958]: Accepted publickey for core from 10.0.0.1 port 50616 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:47.343000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.346777 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:47.347520 kernel: audit: type=1101 audit(1747097027.339:1480): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.347662 kernel: audit: type=1103 audit(1747097027.343:1481): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.347721 kernel: audit: type=1006 audit(1747097027.346:1482): pid=4958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:43:47.346000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ca891e0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:47.356792 kernel: audit: type=1300 audit(1747097027.346:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ca891e0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:47.356829 kernel: audit: type=1327 audit(1747097027.346:1482): proctitle=737368643A20636F7265205B707269765D May 13 00:43:47.356844 kernel: audit: type=1105 audit(1747097027.355:1483): pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:47.355000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.350961 systemd-logind[1189]: New session 24 of user core. May 13 00:43:47.351694 systemd[1]: Started session-24.scope. May 13 00:43:47.356000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.364195 kernel: audit: type=1103 audit(1747097027.356:1484): pid=4960 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.472389 sshd[4958]: pam_unix(sshd:session): session closed for user core May 13 00:43:47.472000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.474843 systemd[1]: sshd@23-10.0.0.65:22-10.0.0.1:50616.service: Deactivated successfully. May 13 00:43:47.475574 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:43:47.476206 systemd-logind[1189]: Session 24 logged out. Waiting for processes to exit. May 13 00:43:47.476879 systemd-logind[1189]: Removed session 24. May 13 00:43:47.472000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.481068 kernel: audit: type=1106 audit(1747097027.472:1485): pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.481128 kernel: audit: type=1104 audit(1747097027.472:1486): pid=4958 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:47.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.65:22-10.0.0.1:50616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:52.479092 systemd[1]: Started sshd@24-10.0.0.65:22-10.0.0.1:50626.service. May 13 00:43:52.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.65:22-10.0.0.1:50626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:52.484738 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:43:52.484877 kernel: audit: type=1130 audit(1747097032.477:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.65:22-10.0.0.1:50626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:52.512000 audit[4977]: USER_ACCT pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.514132 sshd[4977]: Accepted publickey for core from 10.0.0.1 port 50626 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:52.515902 sshd[4977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:52.514000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.521975 kernel: audit: type=1101 audit(1747097032.512:1489): pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.522029 kernel: audit: type=1103 audit(1747097032.514:1490): pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.522049 kernel: audit: type=1006 audit(1747097032.514:1491): pid=4977 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 00:43:52.520403 systemd[1]: Started session-25.scope. May 13 00:43:52.521630 systemd-logind[1189]: New session 25 of user core. May 13 00:43:52.514000 audit[4977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5393a5a0 a2=3 a3=0 items=0 ppid=1 pid=4977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:52.527994 kernel: audit: type=1300 audit(1747097032.514:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5393a5a0 a2=3 a3=0 items=0 ppid=1 pid=4977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:52.514000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:52.529644 kernel: audit: type=1327 audit(1747097032.514:1491): proctitle=737368643A20636F7265205B707269765D May 13 00:43:52.526000 audit[4977]: USER_START pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.534034 kernel: audit: type=1105 audit(1747097032.526:1492): pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.527000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.537674 kernel: audit: type=1103 audit(1747097032.527:1493): pid=4979 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.684093 sshd[4977]: pam_unix(sshd:session): session closed for user core May 13 00:43:52.683000 audit[4977]: USER_END pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.686606 systemd[1]: sshd@24-10.0.0.65:22-10.0.0.1:50626.service: Deactivated successfully. May 13 00:43:52.687288 systemd[1]: session-25.scope: Deactivated successfully. May 13 00:43:52.688123 systemd-logind[1189]: Session 25 logged out. Waiting for processes to exit. May 13 00:43:52.688804 systemd-logind[1189]: Removed session 25. May 13 00:43:52.683000 audit[4977]: CRED_DISP pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.693532 kernel: audit: type=1106 audit(1747097032.683:1494): pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.693596 kernel: audit: type=1104 audit(1747097032.683:1495): pid=4977 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:52.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.65:22-10.0.0.1:50626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.688019 systemd[1]: Started sshd@25-10.0.0.65:22-10.0.0.1:52880.service. May 13 00:43:57.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.65:22-10.0.0.1:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.693382 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:43:57.693479 kernel: audit: type=1130 audit(1747097037.686:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.65:22-10.0.0.1:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.723000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.725259 sshd[5012]: Accepted publickey for core from 10.0.0.1 port 52880 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:57.727000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.729454 kernel: audit: type=1101 audit(1747097037.723:1498): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.729498 kernel: audit: type=1103 audit(1747097037.727:1499): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.729429 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:57.732928 systemd-logind[1189]: New session 26 of user core. May 13 00:43:57.733608 systemd[1]: Started session-26.scope. May 13 00:43:57.735899 kernel: audit: type=1006 audit(1747097037.727:1500): pid=5012 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 13 00:43:57.736011 kernel: audit: type=1300 audit(1747097037.727:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed0444be0 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.727000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed0444be0 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:57.741696 kernel: audit: type=1327 audit(1747097037.727:1500): proctitle=737368643A20636F7265205B707269765D May 13 00:43:57.741758 kernel: audit: type=1105 audit(1747097037.736:1501): pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.736000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.737000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.749836 kernel: audit: type=1103 audit(1747097037.737:1502): pid=5014 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.856280 sshd[5012]: pam_unix(sshd:session): session closed for user core May 13 00:43:57.855000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.861639 systemd[1]: sshd@25-10.0.0.65:22-10.0.0.1:52880.service: Deactivated successfully. May 13 00:43:57.855000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.862428 systemd[1]: session-26.scope: Deactivated successfully. May 13 00:43:57.863179 systemd-logind[1189]: Session 26 logged out. Waiting for processes to exit. May 13 00:43:57.864054 systemd-logind[1189]: Removed session 26. May 13 00:43:57.865267 kernel: audit: type=1106 audit(1747097037.855:1503): pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.865352 kernel: audit: type=1104 audit(1747097037.855:1504): pid=5012 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:57.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.65:22-10.0.0.1:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'