May 13 00:42:57.044771 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:42:57.044793 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:42:57.044803 kernel: BIOS-provided physical RAM map: May 13 00:42:57.044809 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:42:57.044814 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:42:57.044820 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:42:57.044827 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:42:57.044832 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:42:57.044838 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:42:57.044845 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:42:57.044851 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 13 00:42:57.044856 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:42:57.044862 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:42:57.044867 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:42:57.044874 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:42:57.044882 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:42:57.044888 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:42:57.044893 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:42:57.044902 kernel: NX (Execute Disable) protection: active May 13 00:42:57.044908 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:42:57.044914 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:42:57.044920 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:42:57.044926 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:42:57.044939 kernel: extended physical RAM map: May 13 00:42:57.044945 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:42:57.044953 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:42:57.044959 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:42:57.044965 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:42:57.044972 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:42:57.044981 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:42:57.044995 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:42:57.045003 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 13 00:42:57.045011 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 13 00:42:57.045018 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 13 00:42:57.045026 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 13 00:42:57.045033 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 13 00:42:57.045042 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:42:57.045048 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:42:57.045054 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:42:57.045061 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:42:57.045099 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:42:57.045107 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:42:57.045114 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:42:57.045122 kernel: efi: EFI v2.70 by EDK II May 13 00:42:57.045128 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 13 00:42:57.045135 kernel: random: crng init done May 13 00:42:57.045142 kernel: SMBIOS 2.8 present. May 13 00:42:57.045148 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 13 00:42:57.045156 kernel: Hypervisor detected: KVM May 13 00:42:57.045165 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:42:57.045173 kernel: kvm-clock: cpu 0, msr 16196001, primary cpu clock May 13 00:42:57.045182 kernel: kvm-clock: using sched offset of 4988206299 cycles May 13 00:42:57.045197 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:42:57.045205 kernel: tsc: Detected 2794.748 MHz processor May 13 00:42:57.045212 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:42:57.045219 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:42:57.045226 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 13 00:42:57.045233 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:42:57.045239 kernel: Using GB pages for direct mapping May 13 00:42:57.045247 kernel: Secure boot disabled May 13 00:42:57.045256 kernel: ACPI: Early table checksum verification disabled May 13 00:42:57.045267 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 13 00:42:57.045275 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 13 00:42:57.045284 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045293 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045304 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 13 00:42:57.045313 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045320 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045329 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045338 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:42:57.045349 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 13 00:42:57.045357 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 13 00:42:57.045366 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 13 00:42:57.045374 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 13 00:42:57.045383 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 13 00:42:57.045391 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 13 00:42:57.045400 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 13 00:42:57.045408 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 13 00:42:57.045416 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 13 00:42:57.045427 kernel: No NUMA configuration found May 13 00:42:57.045436 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 13 00:42:57.045445 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 13 00:42:57.045453 kernel: Zone ranges: May 13 00:42:57.045461 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:42:57.045470 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 13 00:42:57.045478 kernel: Normal empty May 13 00:42:57.045486 kernel: Movable zone start for each node May 13 00:42:57.045494 kernel: Early memory node ranges May 13 00:42:57.045504 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 13 00:42:57.045513 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 13 00:42:57.045521 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 13 00:42:57.045530 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 13 00:42:57.045539 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 13 00:42:57.045547 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 13 00:42:57.045556 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 13 00:42:57.045564 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:42:57.045572 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 13 00:42:57.045581 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 13 00:42:57.045591 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:42:57.045600 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 13 00:42:57.045609 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 13 00:42:57.045617 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 13 00:42:57.045626 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:42:57.045634 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:42:57.045643 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:42:57.045651 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:42:57.045659 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:42:57.045670 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:42:57.045679 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:42:57.045688 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:42:57.045699 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:42:57.045710 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:42:57.045718 kernel: TSC deadline timer available May 13 00:42:57.045727 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:42:57.045735 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:42:57.045743 kernel: kvm-guest: setup PV sched yield May 13 00:42:57.045754 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 13 00:42:57.045763 kernel: Booting paravirtualized kernel on KVM May 13 00:42:57.045779 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:42:57.045790 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:42:57.045798 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:42:57.045807 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:42:57.045815 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:42:57.045824 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:42:57.045833 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 13 00:42:57.045842 kernel: kvm-guest: PV spinlocks enabled May 13 00:42:57.045851 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:42:57.045859 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 13 00:42:57.045870 kernel: Policy zone: DMA32 May 13 00:42:57.045880 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:42:57.045890 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:42:57.045899 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:42:57.045910 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:42:57.045919 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:42:57.045929 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 13 00:42:57.045947 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:42:57.045956 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:42:57.045964 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:42:57.045973 kernel: rcu: Hierarchical RCU implementation. May 13 00:42:57.045982 kernel: rcu: RCU event tracing is enabled. May 13 00:42:57.045992 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:42:57.046003 kernel: Rude variant of Tasks RCU enabled. May 13 00:42:57.046013 kernel: Tracing variant of Tasks RCU enabled. May 13 00:42:57.046022 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:42:57.046031 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:42:57.046039 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:42:57.046048 kernel: Console: colour dummy device 80x25 May 13 00:42:57.046057 kernel: printk: console [ttyS0] enabled May 13 00:42:57.046066 kernel: ACPI: Core revision 20210730 May 13 00:42:57.046089 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:42:57.046101 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:42:57.046110 kernel: x2apic enabled May 13 00:42:57.046118 kernel: Switched APIC routing to physical x2apic. May 13 00:42:57.046127 kernel: kvm-guest: setup PV IPIs May 13 00:42:57.046136 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:42:57.046145 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:42:57.046154 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 13 00:42:57.046163 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:42:57.046176 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:42:57.046187 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:42:57.046196 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:42:57.046205 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:42:57.046214 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:42:57.046223 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:42:57.046232 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:42:57.046241 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:42:57.046253 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:42:57.046262 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:42:57.046273 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:42:57.046282 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:42:57.046291 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:42:57.046300 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:42:57.046309 kernel: Freeing SMP alternatives memory: 32K May 13 00:42:57.046318 kernel: pid_max: default: 32768 minimum: 301 May 13 00:42:57.046327 kernel: LSM: Security Framework initializing May 13 00:42:57.046335 kernel: SELinux: Initializing. May 13 00:42:57.046344 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:42:57.046355 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:42:57.046364 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:42:57.046373 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:42:57.046381 kernel: ... version: 0 May 13 00:42:57.046389 kernel: ... bit width: 48 May 13 00:42:57.046396 kernel: ... generic registers: 6 May 13 00:42:57.046403 kernel: ... value mask: 0000ffffffffffff May 13 00:42:57.046410 kernel: ... max period: 00007fffffffffff May 13 00:42:57.046417 kernel: ... fixed-purpose events: 0 May 13 00:42:57.046425 kernel: ... event mask: 000000000000003f May 13 00:42:57.046432 kernel: signal: max sigframe size: 1776 May 13 00:42:57.046439 kernel: rcu: Hierarchical SRCU implementation. May 13 00:42:57.046446 kernel: smp: Bringing up secondary CPUs ... May 13 00:42:57.046452 kernel: x86: Booting SMP configuration: May 13 00:42:57.046459 kernel: .... node #0, CPUs: #1 May 13 00:42:57.046466 kernel: kvm-clock: cpu 1, msr 16196041, secondary cpu clock May 13 00:42:57.046473 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:42:57.046480 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 13 00:42:57.046488 kernel: #2 May 13 00:42:57.046495 kernel: kvm-clock: cpu 2, msr 16196081, secondary cpu clock May 13 00:42:57.046502 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:42:57.046509 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 13 00:42:57.046516 kernel: #3 May 13 00:42:57.046523 kernel: kvm-clock: cpu 3, msr 161960c1, secondary cpu clock May 13 00:42:57.046529 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:42:57.046536 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 13 00:42:57.046543 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:42:57.046553 kernel: smpboot: Max logical packages: 1 May 13 00:42:57.046562 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 13 00:42:57.046569 kernel: devtmpfs: initialized May 13 00:42:57.046576 kernel: x86/mm: Memory block size: 128MB May 13 00:42:57.046585 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 13 00:42:57.046592 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 13 00:42:57.046600 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 13 00:42:57.046609 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 13 00:42:57.046616 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 13 00:42:57.046623 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:42:57.046631 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:42:57.046638 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:42:57.046645 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:42:57.046652 kernel: audit: initializing netlink subsys (disabled) May 13 00:42:57.046659 kernel: audit: type=2000 audit(1747096977.059:1): state=initialized audit_enabled=0 res=1 May 13 00:42:57.046666 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:42:57.046673 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:42:57.046679 kernel: cpuidle: using governor menu May 13 00:42:57.046686 kernel: ACPI: bus type PCI registered May 13 00:42:57.046695 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:42:57.046702 kernel: dca service started, version 1.12.1 May 13 00:42:57.046709 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:42:57.046716 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:42:57.046722 kernel: PCI: Using configuration type 1 for base access May 13 00:42:57.046729 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:42:57.046739 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:42:57.046745 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:42:57.046752 kernel: ACPI: Added _OSI(Module Device) May 13 00:42:57.046761 kernel: ACPI: Added _OSI(Processor Device) May 13 00:42:57.046768 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:42:57.046774 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:42:57.046781 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:42:57.046788 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:42:57.046795 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:42:57.046802 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:42:57.046809 kernel: ACPI: Interpreter enabled May 13 00:42:57.046816 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:42:57.046824 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:42:57.046831 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:42:57.046838 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:42:57.046845 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:42:57.047026 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:42:57.047121 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:42:57.047195 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:42:57.047207 kernel: PCI host bridge to bus 0000:00 May 13 00:42:57.047299 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:42:57.047368 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:42:57.047460 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:42:57.047542 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:42:57.047610 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:42:57.047675 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 13 00:42:57.047746 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:42:57.047849 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:42:57.047952 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:42:57.048031 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 13 00:42:57.048177 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 13 00:42:57.048719 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 13 00:42:57.048811 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 13 00:42:57.048896 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:42:57.049008 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:42:57.049111 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 13 00:42:57.049194 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 13 00:42:57.049275 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 13 00:42:57.049372 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:42:57.049458 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 13 00:42:57.053423 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 13 00:42:57.053533 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 13 00:42:57.053645 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:42:57.053723 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 13 00:42:57.053798 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 13 00:42:57.053872 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 13 00:42:57.053967 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 13 00:42:57.054096 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:42:57.054177 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:42:57.054268 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:42:57.054364 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 13 00:42:57.054472 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 13 00:42:57.054584 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:42:57.054703 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 13 00:42:57.054715 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:42:57.054723 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:42:57.054731 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:42:57.054738 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:42:57.054745 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:42:57.054753 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:42:57.054760 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:42:57.054787 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:42:57.054795 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:42:57.054802 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:42:57.054810 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:42:57.054817 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:42:57.054824 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:42:57.054832 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:42:57.054840 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:42:57.054847 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:42:57.054857 kernel: iommu: Default domain type: Translated May 13 00:42:57.054865 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:42:57.055015 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:42:57.055109 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:42:57.055185 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:42:57.055195 kernel: vgaarb: loaded May 13 00:42:57.055217 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:42:57.055225 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:42:57.055232 kernel: PTP clock support registered May 13 00:42:57.055244 kernel: Registered efivars operations May 13 00:42:57.055251 kernel: PCI: Using ACPI for IRQ routing May 13 00:42:57.055258 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:42:57.055266 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 13 00:42:57.055274 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 13 00:42:57.055287 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 13 00:42:57.055294 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 13 00:42:57.055301 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 13 00:42:57.055309 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 13 00:42:57.055319 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:42:57.055326 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:42:57.055334 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:42:57.055341 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:42:57.055362 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:42:57.055370 kernel: pnp: PnP ACPI init May 13 00:42:57.055472 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:42:57.055483 kernel: pnp: PnP ACPI: found 6 devices May 13 00:42:57.055493 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:42:57.055509 kernel: NET: Registered PF_INET protocol family May 13 00:42:57.055523 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:42:57.055531 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:42:57.055539 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:42:57.055546 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:42:57.055553 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:42:57.055561 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:42:57.055570 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:42:57.055578 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:42:57.055585 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:42:57.055593 kernel: NET: Registered PF_XDP protocol family May 13 00:42:57.055697 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 13 00:42:57.055795 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 13 00:42:57.055912 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:42:57.056015 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:42:57.056132 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:42:57.056229 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:42:57.056331 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:42:57.056411 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 13 00:42:57.056427 kernel: PCI: CLS 0 bytes, default 64 May 13 00:42:57.056434 kernel: Initialise system trusted keyrings May 13 00:42:57.056442 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:42:57.056449 kernel: Key type asymmetric registered May 13 00:42:57.056456 kernel: Asymmetric key parser 'x509' registered May 13 00:42:57.056467 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:42:57.056475 kernel: io scheduler mq-deadline registered May 13 00:42:57.056508 kernel: io scheduler kyber registered May 13 00:42:57.056518 kernel: io scheduler bfq registered May 13 00:42:57.056526 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:42:57.056534 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:42:57.056542 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:42:57.056549 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:42:57.056557 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:42:57.056580 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:42:57.056588 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:42:57.056596 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:42:57.056605 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:42:57.056723 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:42:57.056735 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:42:57.056824 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:42:57.056938 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:42:56 UTC (1747096976) May 13 00:42:57.057034 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:42:57.057045 kernel: efifb: probing for efifb May 13 00:42:57.057053 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 13 00:42:57.057061 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 13 00:42:57.057068 kernel: efifb: scrolling: redraw May 13 00:42:57.057095 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 13 00:42:57.057103 kernel: Console: switching to colour frame buffer device 160x50 May 13 00:42:57.057110 kernel: fb0: EFI VGA frame buffer device May 13 00:42:57.057118 kernel: pstore: Registered efi as persistent store backend May 13 00:42:57.057128 kernel: NET: Registered PF_INET6 protocol family May 13 00:42:57.057136 kernel: Segment Routing with IPv6 May 13 00:42:57.057144 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:42:57.057153 kernel: NET: Registered PF_PACKET protocol family May 13 00:42:57.057160 kernel: Key type dns_resolver registered May 13 00:42:57.057168 kernel: IPI shorthand broadcast: enabled May 13 00:42:57.057177 kernel: sched_clock: Marking stable (483564258, 138202802)->(682390629, -60623569) May 13 00:42:57.057184 kernel: registered taskstats version 1 May 13 00:42:57.057192 kernel: Loading compiled-in X.509 certificates May 13 00:42:57.057200 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:42:57.057208 kernel: Key type .fscrypt registered May 13 00:42:57.057215 kernel: Key type fscrypt-provisioning registered May 13 00:42:57.057223 kernel: pstore: Using crash dump compression: deflate May 13 00:42:57.057231 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:42:57.057241 kernel: ima: Allocated hash algorithm: sha1 May 13 00:42:57.057249 kernel: ima: No architecture policies found May 13 00:42:57.057257 kernel: clk: Disabling unused clocks May 13 00:42:57.057264 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:42:57.057272 kernel: Write protecting the kernel read-only data: 28672k May 13 00:42:57.057279 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:42:57.057287 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:42:57.057294 kernel: Run /init as init process May 13 00:42:57.057302 kernel: with arguments: May 13 00:42:57.057310 kernel: /init May 13 00:42:57.057318 kernel: with environment: May 13 00:42:57.057325 kernel: HOME=/ May 13 00:42:57.057333 kernel: TERM=linux May 13 00:42:57.057340 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:42:57.057350 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:42:57.057361 systemd[1]: Detected virtualization kvm. May 13 00:42:57.057369 systemd[1]: Detected architecture x86-64. May 13 00:42:57.057378 systemd[1]: Running in initrd. May 13 00:42:57.057386 systemd[1]: No hostname configured, using default hostname. May 13 00:42:57.057394 systemd[1]: Hostname set to . May 13 00:42:57.057402 systemd[1]: Initializing machine ID from VM UUID. May 13 00:42:57.057410 systemd[1]: Queued start job for default target initrd.target. May 13 00:42:57.057418 systemd[1]: Started systemd-ask-password-console.path. May 13 00:42:57.057426 systemd[1]: Reached target cryptsetup.target. May 13 00:42:57.057434 systemd[1]: Reached target paths.target. May 13 00:42:57.057441 systemd[1]: Reached target slices.target. May 13 00:42:57.057451 systemd[1]: Reached target swap.target. May 13 00:42:57.057458 systemd[1]: Reached target timers.target. May 13 00:42:57.057466 systemd[1]: Listening on iscsid.socket. May 13 00:42:57.057474 systemd[1]: Listening on iscsiuio.socket. May 13 00:42:57.057482 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:42:57.057491 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:42:57.057499 systemd[1]: Listening on systemd-journald.socket. May 13 00:42:57.057508 systemd[1]: Listening on systemd-networkd.socket. May 13 00:42:57.057516 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:42:57.057524 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:42:57.057532 systemd[1]: Reached target sockets.target. May 13 00:42:57.057540 systemd[1]: Starting kmod-static-nodes.service... May 13 00:42:57.057548 systemd[1]: Finished network-cleanup.service. May 13 00:42:57.057556 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:42:57.057578 systemd[1]: Starting systemd-journald.service... May 13 00:42:57.057599 systemd[1]: Starting systemd-modules-load.service... May 13 00:42:57.057610 systemd[1]: Starting systemd-resolved.service... May 13 00:42:57.057617 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:42:57.057625 systemd[1]: Finished kmod-static-nodes.service. May 13 00:42:57.057633 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:42:57.057642 kernel: audit: type=1130 audit(1747096977.048:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.057650 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:42:57.057662 systemd-journald[197]: Journal started May 13 00:42:57.057715 systemd-journald[197]: Runtime Journal (/run/log/journal/f54058e4a7c94960ae50e523ae2ac707) is 6.0M, max 48.4M, 42.4M free. May 13 00:42:57.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.052336 systemd-modules-load[198]: Inserted module 'overlay' May 13 00:42:57.061165 systemd[1]: Started systemd-journald.service. May 13 00:42:57.061190 kernel: audit: type=1130 audit(1747096977.060:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.062409 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:42:57.069644 kernel: audit: type=1130 audit(1747096977.064:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.065115 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:42:57.092160 kernel: audit: type=1130 audit(1747096977.069:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.070523 systemd-resolved[199]: Positive Trust Anchors: May 13 00:42:57.070535 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:42:57.070573 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:42:57.073890 systemd-resolved[199]: Defaulting to hostname 'linux'. May 13 00:42:57.100704 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:42:57.102747 systemd[1]: Started systemd-resolved.service. May 13 00:42:57.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.104689 systemd[1]: Reached target nss-lookup.target. May 13 00:42:57.108962 kernel: audit: type=1130 audit(1747096977.104:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.112879 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:42:57.118211 kernel: audit: type=1130 audit(1747096977.113:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.114574 systemd[1]: Starting dracut-cmdline.service... May 13 00:42:57.122096 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:42:57.125154 dracut-cmdline[216]: dracut-dracut-053 May 13 00:42:57.127250 systemd-modules-load[198]: Inserted module 'br_netfilter' May 13 00:42:57.128376 kernel: Bridge firewalling registered May 13 00:42:57.128647 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:42:57.145100 kernel: SCSI subsystem initialized May 13 00:42:57.158253 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:42:57.158295 kernel: device-mapper: uevent: version 1.0.3 May 13 00:42:57.158306 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:42:57.161017 systemd-modules-load[198]: Inserted module 'dm_multipath' May 13 00:42:57.161841 systemd[1]: Finished systemd-modules-load.service. May 13 00:42:57.167384 kernel: audit: type=1130 audit(1747096977.162:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.163673 systemd[1]: Starting systemd-sysctl.service... May 13 00:42:57.171736 systemd[1]: Finished systemd-sysctl.service. May 13 00:42:57.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.177123 kernel: audit: type=1130 audit(1747096977.173:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.198117 kernel: Loading iSCSI transport class v2.0-870. May 13 00:42:57.214118 kernel: iscsi: registered transport (tcp) May 13 00:42:57.239124 kernel: iscsi: registered transport (qla4xxx) May 13 00:42:57.239204 kernel: QLogic iSCSI HBA Driver May 13 00:42:57.273218 systemd[1]: Finished dracut-cmdline.service. May 13 00:42:57.277829 kernel: audit: type=1130 audit(1747096977.273:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.277845 systemd[1]: Starting dracut-pre-udev.service... May 13 00:42:57.326142 kernel: raid6: avx2x4 gen() 29374 MB/s May 13 00:42:57.343119 kernel: raid6: avx2x4 xor() 7201 MB/s May 13 00:42:57.360126 kernel: raid6: avx2x2 gen() 31447 MB/s May 13 00:42:57.377111 kernel: raid6: avx2x2 xor() 18355 MB/s May 13 00:42:57.394140 kernel: raid6: avx2x1 gen() 23178 MB/s May 13 00:42:57.412100 kernel: raid6: avx2x1 xor() 14989 MB/s May 13 00:42:57.457113 kernel: raid6: sse2x4 gen() 14211 MB/s May 13 00:42:57.474096 kernel: raid6: sse2x4 xor() 6925 MB/s May 13 00:42:57.491099 kernel: raid6: sse2x2 gen() 16164 MB/s May 13 00:42:57.509095 kernel: raid6: sse2x2 xor() 9750 MB/s May 13 00:42:57.526096 kernel: raid6: sse2x1 gen() 12259 MB/s May 13 00:42:57.558437 kernel: raid6: sse2x1 xor() 7789 MB/s May 13 00:42:57.558454 kernel: raid6: using algorithm avx2x2 gen() 31447 MB/s May 13 00:42:57.558463 kernel: raid6: .... xor() 18355 MB/s, rmw enabled May 13 00:42:57.559149 kernel: raid6: using avx2x2 recovery algorithm May 13 00:42:57.572109 kernel: xor: automatically using best checksumming function avx May 13 00:42:57.664128 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:42:57.673457 systemd[1]: Finished dracut-pre-udev.service. May 13 00:42:57.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.674000 audit: BPF prog-id=7 op=LOAD May 13 00:42:57.675000 audit: BPF prog-id=8 op=LOAD May 13 00:42:57.675499 systemd[1]: Starting systemd-udevd.service... May 13 00:42:57.688883 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 13 00:42:57.694953 systemd[1]: Started systemd-udevd.service. May 13 00:42:57.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.695971 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:42:57.707009 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation May 13 00:42:57.731187 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:42:57.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.732923 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:42:57.773464 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:42:57.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:57.804252 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:42:57.818981 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:42:57.819007 kernel: GPT:9289727 != 19775487 May 13 00:42:57.819016 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:42:57.819025 kernel: GPT:9289727 != 19775487 May 13 00:42:57.819033 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:42:57.819041 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:42:57.819051 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:42:57.820118 kernel: libata version 3.00 loaded. May 13 00:42:57.823448 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:42:57.823471 kernel: AES CTR mode by8 optimization enabled May 13 00:42:57.834542 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:42:57.856021 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:42:57.856037 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:42:57.856155 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:42:57.856235 kernel: scsi host0: ahci May 13 00:42:57.856332 kernel: scsi host1: ahci May 13 00:42:57.856420 kernel: scsi host2: ahci May 13 00:42:57.856517 kernel: scsi host3: ahci May 13 00:42:57.856659 kernel: scsi host4: ahci May 13 00:42:57.856778 kernel: scsi host5: ahci May 13 00:42:57.856865 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 13 00:42:57.856874 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 13 00:42:57.856883 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 13 00:42:57.856892 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 13 00:42:57.856916 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 13 00:42:57.856925 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 13 00:42:57.852321 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:42:57.865489 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:42:57.867510 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (446) May 13 00:42:57.868701 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:42:57.877611 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:42:57.885110 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:42:57.887831 systemd[1]: Starting disk-uuid.service... May 13 00:42:57.895104 disk-uuid[535]: Primary Header is updated. May 13 00:42:57.895104 disk-uuid[535]: Secondary Entries is updated. May 13 00:42:57.895104 disk-uuid[535]: Secondary Header is updated. May 13 00:42:57.898569 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:42:57.901109 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:42:58.159116 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:42:58.159214 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:42:58.167116 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:42:58.167208 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:42:58.168120 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:42:58.169101 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:42:58.170108 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:42:58.171204 kernel: ata3.00: applying bridge limits May 13 00:42:58.172141 kernel: ata3.00: configured for UDMA/100 May 13 00:42:58.174096 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:42:58.204207 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:42:58.221799 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:42:58.221812 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:42:58.904643 disk-uuid[536]: The operation has completed successfully. May 13 00:42:58.905935 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:42:58.928483 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:42:58.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:58.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:58.928569 systemd[1]: Finished disk-uuid.service. May 13 00:42:58.934982 systemd[1]: Starting verity-setup.service... May 13 00:42:58.948100 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:42:58.967238 systemd[1]: Found device dev-mapper-usr.device. May 13 00:42:58.968781 systemd[1]: Mounting sysusr-usr.mount... May 13 00:42:58.970774 systemd[1]: Finished verity-setup.service. May 13 00:42:58.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.028666 systemd[1]: Mounted sysusr-usr.mount. May 13 00:42:59.030052 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:42:59.029036 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:42:59.030113 systemd[1]: Starting ignition-setup.service... May 13 00:42:59.032637 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:42:59.044411 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:42:59.044477 kernel: BTRFS info (device vda6): using free space tree May 13 00:42:59.044488 kernel: BTRFS info (device vda6): has skinny extents May 13 00:42:59.053373 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:42:59.063064 systemd[1]: Finished ignition-setup.service. May 13 00:42:59.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.064780 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:42:59.098609 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:42:59.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.100000 audit: BPF prog-id=9 op=LOAD May 13 00:42:59.101106 systemd[1]: Starting systemd-networkd.service... May 13 00:42:59.105300 ignition[652]: Ignition 2.14.0 May 13 00:42:59.105312 ignition[652]: Stage: fetch-offline May 13 00:42:59.105395 ignition[652]: no configs at "/usr/lib/ignition/base.d" May 13 00:42:59.105405 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:42:59.106120 ignition[652]: parsed url from cmdline: "" May 13 00:42:59.106124 ignition[652]: no config URL provided May 13 00:42:59.106142 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:42:59.106151 ignition[652]: no config at "/usr/lib/ignition/user.ign" May 13 00:42:59.106780 ignition[652]: op(1): [started] loading QEMU firmware config module May 13 00:42:59.106785 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:42:59.113473 ignition[652]: op(1): [finished] loading QEMU firmware config module May 13 00:42:59.126419 systemd-networkd[718]: lo: Link UP May 13 00:42:59.126429 systemd-networkd[718]: lo: Gained carrier May 13 00:42:59.126851 systemd-networkd[718]: Enumeration completed May 13 00:42:59.127057 systemd-networkd[718]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:42:59.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.128988 systemd-networkd[718]: eth0: Link UP May 13 00:42:59.128991 systemd-networkd[718]: eth0: Gained carrier May 13 00:42:59.129500 systemd[1]: Started systemd-networkd.service. May 13 00:42:59.130542 systemd[1]: Reached target network.target. May 13 00:42:59.133616 systemd[1]: Starting iscsiuio.service... May 13 00:42:59.137666 systemd[1]: Started iscsiuio.service. May 13 00:42:59.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.139663 systemd[1]: Starting iscsid.service... May 13 00:42:59.142944 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:42:59.142944 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:42:59.142944 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:42:59.142944 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:42:59.142944 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:42:59.142944 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:42:59.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.144099 systemd[1]: Started iscsid.service. May 13 00:42:59.146174 systemd[1]: Starting dracut-initqueue.service... May 13 00:42:59.155620 systemd[1]: Finished dracut-initqueue.service. May 13 00:42:59.157151 systemd[1]: Reached target remote-fs-pre.target. May 13 00:42:59.159460 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:42:59.160459 systemd[1]: Reached target remote-fs.target. May 13 00:42:59.161969 systemd[1]: Starting dracut-pre-mount.service... May 13 00:42:59.168964 systemd[1]: Finished dracut-pre-mount.service. May 13 00:42:59.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.188511 ignition[652]: parsing config with SHA512: c6764fc2ed132c84ff033b2a703db9b2440140645fe30fc5436602b36cf3308ecc2fc51087ab1618f405d328c5626657502d2cd60a8fa220adce2b79fbe160d0 May 13 00:42:59.195970 unknown[652]: fetched base config from "system" May 13 00:42:59.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.196396 ignition[652]: fetch-offline: fetch-offline passed May 13 00:42:59.195980 unknown[652]: fetched user config from "qemu" May 13 00:42:59.196443 ignition[652]: Ignition finished successfully May 13 00:42:59.197510 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:42:59.199234 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:42:59.199974 systemd[1]: Starting ignition-kargs.service... May 13 00:42:59.200298 systemd-networkd[718]: eth0: DHCPv4 address 10.0.0.77/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:42:59.208726 ignition[739]: Ignition 2.14.0 May 13 00:42:59.208736 ignition[739]: Stage: kargs May 13 00:42:59.208826 ignition[739]: no configs at "/usr/lib/ignition/base.d" May 13 00:42:59.208835 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:42:59.211278 systemd[1]: Finished ignition-kargs.service. May 13 00:42:59.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.209770 ignition[739]: kargs: kargs passed May 13 00:42:59.213793 systemd[1]: Starting ignition-disks.service... May 13 00:42:59.209803 ignition[739]: Ignition finished successfully May 13 00:42:59.220507 ignition[745]: Ignition 2.14.0 May 13 00:42:59.220517 ignition[745]: Stage: disks May 13 00:42:59.220598 ignition[745]: no configs at "/usr/lib/ignition/base.d" May 13 00:42:59.220608 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:42:59.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.222260 systemd[1]: Finished ignition-disks.service. May 13 00:42:59.221571 ignition[745]: disks: disks passed May 13 00:42:59.223794 systemd[1]: Reached target initrd-root-device.target. May 13 00:42:59.221616 ignition[745]: Ignition finished successfully May 13 00:42:59.225726 systemd[1]: Reached target local-fs-pre.target. May 13 00:42:59.226716 systemd[1]: Reached target local-fs.target. May 13 00:42:59.227655 systemd[1]: Reached target sysinit.target. May 13 00:42:59.229396 systemd[1]: Reached target basic.target. May 13 00:42:59.230787 systemd[1]: Starting systemd-fsck-root.service... May 13 00:42:59.241268 systemd-fsck[753]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:42:59.247733 systemd[1]: Finished systemd-fsck-root.service. May 13 00:42:59.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.249124 systemd[1]: Mounting sysroot.mount... May 13 00:42:59.255101 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:42:59.255576 systemd[1]: Mounted sysroot.mount. May 13 00:42:59.255880 systemd[1]: Reached target initrd-root-fs.target. May 13 00:42:59.258483 systemd[1]: Mounting sysroot-usr.mount... May 13 00:42:59.259034 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:42:59.259093 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:42:59.259121 systemd[1]: Reached target ignition-diskful.target. May 13 00:42:59.267466 systemd[1]: Mounted sysroot-usr.mount. May 13 00:42:59.268575 systemd[1]: Starting initrd-setup-root.service... May 13 00:42:59.272990 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:42:59.277238 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 13 00:42:59.281448 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:42:59.285478 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:42:59.310614 systemd[1]: Finished initrd-setup-root.service. May 13 00:42:59.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.311560 systemd[1]: Starting ignition-mount.service... May 13 00:42:59.313679 systemd[1]: Starting sysroot-boot.service... May 13 00:42:59.317747 bash[804]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:42:59.326715 ignition[805]: INFO : Ignition 2.14.0 May 13 00:42:59.327787 ignition[805]: INFO : Stage: mount May 13 00:42:59.328753 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:42:59.329933 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:42:59.331261 ignition[805]: INFO : mount: mount passed May 13 00:42:59.331261 ignition[805]: INFO : Ignition finished successfully May 13 00:42:59.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.331881 systemd[1]: Finished ignition-mount.service. May 13 00:42:59.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:42:59.334475 systemd[1]: Finished sysroot-boot.service. May 13 00:42:59.978339 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:42:59.985331 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) May 13 00:42:59.985373 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:42:59.985383 kernel: BTRFS info (device vda6): using free space tree May 13 00:42:59.987153 kernel: BTRFS info (device vda6): has skinny extents May 13 00:42:59.990725 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:42:59.992262 systemd[1]: Starting ignition-files.service... May 13 00:43:00.008139 ignition[835]: INFO : Ignition 2.14.0 May 13 00:43:00.008139 ignition[835]: INFO : Stage: files May 13 00:43:00.008139 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:43:00.008139 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:00.013862 ignition[835]: DEBUG : files: compiled without relabeling support, skipping May 13 00:43:00.013862 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:43:00.013862 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:43:00.013862 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:43:00.013862 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:43:00.021744 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:43:00.021744 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:43:00.021744 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 13 00:43:00.014573 unknown[835]: wrote ssh authorized keys file for user: core May 13 00:43:00.067557 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:43:00.178753 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:43:00.178753 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:00.182755 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 00:43:00.704251 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:43:01.057954 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:01.057954 ignition[835]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:43:01.061916 ignition[835]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:43:01.061916 ignition[835]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:43:01.061916 ignition[835]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:43:01.061916 ignition[835]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:43:01.061916 ignition[835]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:43:01.070562 ignition[835]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:43:01.095644 ignition[835]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:43:01.097481 ignition[835]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:43:01.099283 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:43:01.101155 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:43:01.102840 ignition[835]: INFO : files: files passed May 13 00:43:01.103680 ignition[835]: INFO : Ignition finished successfully May 13 00:43:01.104156 systemd[1]: Finished ignition-files.service. May 13 00:43:01.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.106191 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:43:01.106652 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:43:01.111425 systemd[1]: Starting ignition-quench.service... May 13 00:43:01.114092 systemd-networkd[718]: eth0: Gained IPv6LL May 13 00:43:01.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.118016 initrd-setup-root-after-ignition[859]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:43:01.116616 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:43:01.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.122749 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:43:01.118193 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:43:01.118284 systemd[1]: Finished ignition-quench.service. May 13 00:43:01.120691 systemd[1]: Reached target ignition-complete.target. May 13 00:43:01.123313 systemd[1]: Starting initrd-parse-etc.service... May 13 00:43:01.134683 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:43:01.134788 systemd[1]: Finished initrd-parse-etc.service. May 13 00:43:01.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.136863 systemd[1]: Reached target initrd-fs.target. May 13 00:43:01.138475 systemd[1]: Reached target initrd.target. May 13 00:43:01.139357 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:43:01.140198 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:43:01.149244 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:43:01.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.150936 systemd[1]: Starting initrd-cleanup.service... May 13 00:43:01.158465 systemd[1]: Stopped target nss-lookup.target. May 13 00:43:01.159472 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:43:01.161262 systemd[1]: Stopped target timers.target. May 13 00:43:01.163012 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:43:01.174754 kernel: kauditd_printk_skb: 31 callbacks suppressed May 13 00:43:01.174780 kernel: audit: type=1131 audit(1747096981.164:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.163160 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:43:01.164865 systemd[1]: Stopped target initrd.target. May 13 00:43:01.174854 systemd[1]: Stopped target basic.target. May 13 00:43:01.176547 systemd[1]: Stopped target ignition-complete.target. May 13 00:43:01.178284 systemd[1]: Stopped target ignition-diskful.target. May 13 00:43:01.179996 systemd[1]: Stopped target initrd-root-device.target. May 13 00:43:01.181668 systemd[1]: Stopped target remote-fs.target. May 13 00:43:01.183280 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:43:01.184939 systemd[1]: Stopped target sysinit.target. May 13 00:43:01.186374 systemd[1]: Stopped target local-fs.target. May 13 00:43:01.187878 systemd[1]: Stopped target local-fs-pre.target. May 13 00:43:01.189416 systemd[1]: Stopped target swap.target. May 13 00:43:01.196567 kernel: audit: type=1131 audit(1747096981.192:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.190793 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:43:01.190892 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:43:01.202687 kernel: audit: type=1131 audit(1747096981.198:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.192428 systemd[1]: Stopped target cryptsetup.target. May 13 00:43:01.207069 kernel: audit: type=1131 audit(1747096981.202:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.196608 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:43:01.196697 systemd[1]: Stopped dracut-initqueue.service. May 13 00:43:01.198401 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:43:01.198488 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:43:01.202786 systemd[1]: Stopped target paths.target. May 13 00:43:01.207123 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:43:01.211115 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:43:01.212355 systemd[1]: Stopped target slices.target. May 13 00:43:01.214095 systemd[1]: Stopped target sockets.target. May 13 00:43:01.221688 kernel: audit: type=1131 audit(1747096981.217:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.215666 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:43:01.226281 kernel: audit: type=1131 audit(1747096981.221:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.215759 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:43:01.227921 iscsid[724]: iscsid shutting down. May 13 00:43:01.217340 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:43:01.232385 ignition[875]: INFO : Ignition 2.14.0 May 13 00:43:01.232385 ignition[875]: INFO : Stage: umount May 13 00:43:01.232385 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:43:01.232385 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:01.232385 ignition[875]: INFO : umount: umount passed May 13 00:43:01.232385 ignition[875]: INFO : Ignition finished successfully May 13 00:43:01.254164 kernel: audit: type=1131 audit(1747096981.233:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254185 kernel: audit: type=1131 audit(1747096981.238:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254204 kernel: audit: type=1131 audit(1747096981.243:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254214 kernel: audit: type=1131 audit(1747096981.248:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.217426 systemd[1]: Stopped ignition-files.service. May 13 00:43:01.222472 systemd[1]: Stopping ignition-mount.service... May 13 00:43:01.226524 systemd[1]: Stopping iscsid.service... May 13 00:43:01.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.231017 systemd[1]: Stopping sysroot-boot.service... May 13 00:43:01.232405 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:43:01.232530 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:43:01.234166 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:43:01.234290 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:43:01.240596 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:43:01.240683 systemd[1]: Stopped iscsid.service. May 13 00:43:01.244032 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:43:01.244123 systemd[1]: Stopped ignition-mount.service. May 13 00:43:01.249565 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:43:01.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.250062 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:43:01.250149 systemd[1]: Closed iscsid.socket. May 13 00:43:01.252596 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:43:01.252631 systemd[1]: Stopped ignition-disks.service. May 13 00:43:01.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254191 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:43:01.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.254225 systemd[1]: Stopped ignition-kargs.service. May 13 00:43:01.255016 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:43:01.255048 systemd[1]: Stopped ignition-setup.service. May 13 00:43:01.255955 systemd[1]: Stopping iscsiuio.service... May 13 00:43:01.257539 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:43:01.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.257614 systemd[1]: Finished initrd-cleanup.service. May 13 00:43:01.259220 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:43:01.259294 systemd[1]: Stopped iscsiuio.service. May 13 00:43:01.307000 audit: BPF prog-id=6 op=UNLOAD May 13 00:43:01.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.261071 systemd[1]: Stopped target network.target. May 13 00:43:01.270942 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:43:01.270973 systemd[1]: Closed iscsiuio.socket. May 13 00:43:01.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.272651 systemd[1]: Stopping systemd-networkd.service... May 13 00:43:01.274213 systemd[1]: Stopping systemd-resolved.service... May 13 00:43:01.278146 systemd-networkd[718]: eth0: DHCPv6 lease lost May 13 00:43:01.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.323000 audit: BPF prog-id=9 op=UNLOAD May 13 00:43:01.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.279381 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:43:01.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.279472 systemd[1]: Stopped systemd-networkd.service. May 13 00:43:01.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.281970 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:43:01.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.281998 systemd[1]: Closed systemd-networkd.socket. May 13 00:43:01.284311 systemd[1]: Stopping network-cleanup.service... May 13 00:43:01.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.285045 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:43:01.285136 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:43:01.286920 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:43:01.286954 systemd[1]: Stopped systemd-sysctl.service. May 13 00:43:01.296955 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:43:01.296992 systemd[1]: Stopped systemd-modules-load.service. May 13 00:43:01.298823 systemd[1]: Stopping systemd-udevd.service... May 13 00:43:01.301135 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:43:01.301536 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:43:01.301624 systemd[1]: Stopped systemd-resolved.service. May 13 00:43:01.306973 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:43:01.307154 systemd[1]: Stopped systemd-udevd.service. May 13 00:43:01.317228 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:43:01.317302 systemd[1]: Stopped network-cleanup.service. May 13 00:43:01.318777 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:43:01.318816 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:43:01.320211 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:43:01.320240 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:43:01.321807 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:43:01.321841 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:43:01.323400 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:43:01.323431 systemd[1]: Stopped dracut-cmdline.service. May 13 00:43:01.324961 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:43:01.324994 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:43:01.326023 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:43:01.327527 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:43:01.327568 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:43:01.328521 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:43:01.328553 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:43:01.330038 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:43:01.330085 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:43:01.331644 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:43:01.331997 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:43:01.332064 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:43:01.401107 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:43:01.402049 systemd[1]: Stopped sysroot-boot.service. May 13 00:43:01.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.403591 systemd[1]: Reached target initrd-switch-root.target. May 13 00:43:01.405268 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:43:01.406191 systemd[1]: Stopped initrd-setup-root.service. May 13 00:43:01.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:01.408421 systemd[1]: Starting initrd-switch-root.service... May 13 00:43:01.425433 systemd[1]: Switching root. May 13 00:43:01.442786 systemd-journald[197]: Journal stopped May 13 00:43:04.461219 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 13 00:43:04.461270 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:43:04.461283 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:43:04.461293 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:43:04.461303 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:43:04.461313 kernel: SELinux: policy capability open_perms=1 May 13 00:43:04.461323 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:43:04.461340 kernel: SELinux: policy capability always_check_network=0 May 13 00:43:04.461350 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:43:04.461359 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:43:04.461372 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:43:04.461385 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:43:04.461399 systemd[1]: Successfully loaded SELinux policy in 38.987ms. May 13 00:43:04.461418 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.465ms. May 13 00:43:04.461430 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:43:04.461441 systemd[1]: Detected virtualization kvm. May 13 00:43:04.461456 systemd[1]: Detected architecture x86-64. May 13 00:43:04.461466 systemd[1]: Detected first boot. May 13 00:43:04.461477 systemd[1]: Initializing machine ID from VM UUID. May 13 00:43:04.461487 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:43:04.461497 systemd[1]: Populated /etc with preset unit settings. May 13 00:43:04.461510 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:43:04.461525 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:43:04.461537 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:43:04.461548 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:43:04.461559 systemd[1]: Stopped initrd-switch-root.service. May 13 00:43:04.461570 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:43:04.461580 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:43:04.461590 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:43:04.461604 systemd[1]: Created slice system-getty.slice. May 13 00:43:04.461614 systemd[1]: Created slice system-modprobe.slice. May 13 00:43:04.461627 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:43:04.461638 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:43:04.461648 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:43:04.461658 systemd[1]: Created slice user.slice. May 13 00:43:04.461668 systemd[1]: Started systemd-ask-password-console.path. May 13 00:43:04.461678 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:43:04.461689 systemd[1]: Set up automount boot.automount. May 13 00:43:04.461703 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:43:04.461726 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:43:04.461739 systemd[1]: Stopped target initrd-fs.target. May 13 00:43:04.461752 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:43:04.461765 systemd[1]: Reached target integritysetup.target. May 13 00:43:04.461778 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:43:04.461792 systemd[1]: Reached target remote-fs.target. May 13 00:43:04.461812 systemd[1]: Reached target slices.target. May 13 00:43:04.461823 systemd[1]: Reached target swap.target. May 13 00:43:04.461833 systemd[1]: Reached target torcx.target. May 13 00:43:04.461843 systemd[1]: Reached target veritysetup.target. May 13 00:43:04.461853 systemd[1]: Listening on systemd-coredump.socket. May 13 00:43:04.461863 systemd[1]: Listening on systemd-initctl.socket. May 13 00:43:04.461874 systemd[1]: Listening on systemd-networkd.socket. May 13 00:43:04.461884 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:43:04.461894 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:43:04.461905 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:43:04.461919 systemd[1]: Mounting dev-hugepages.mount... May 13 00:43:04.461929 systemd[1]: Mounting dev-mqueue.mount... May 13 00:43:04.461940 systemd[1]: Mounting media.mount... May 13 00:43:04.461950 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:04.461960 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:43:04.461970 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:43:04.461980 systemd[1]: Mounting tmp.mount... May 13 00:43:04.461990 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:43:04.462001 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:43:04.462016 systemd[1]: Starting kmod-static-nodes.service... May 13 00:43:04.462026 systemd[1]: Starting modprobe@configfs.service... May 13 00:43:04.462036 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:43:04.462046 systemd[1]: Starting modprobe@drm.service... May 13 00:43:04.462056 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:43:04.462067 systemd[1]: Starting modprobe@fuse.service... May 13 00:43:04.462089 systemd[1]: Starting modprobe@loop.service... May 13 00:43:04.462100 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:43:04.462110 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:43:04.462125 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:43:04.462135 kernel: loop: module loaded May 13 00:43:04.462145 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:43:04.462154 kernel: fuse: init (API version 7.34) May 13 00:43:04.462164 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:43:04.462175 systemd[1]: Stopped systemd-journald.service. May 13 00:43:04.462185 systemd[1]: Starting systemd-journald.service... May 13 00:43:04.462195 systemd[1]: Starting systemd-modules-load.service... May 13 00:43:04.462205 systemd[1]: Starting systemd-network-generator.service... May 13 00:43:04.462220 systemd[1]: Starting systemd-remount-fs.service... May 13 00:43:04.462230 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:43:04.462240 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:43:04.462250 systemd[1]: Stopped verity-setup.service. May 13 00:43:04.462263 systemd-journald[989]: Journal started May 13 00:43:04.462306 systemd-journald[989]: Runtime Journal (/run/log/journal/f54058e4a7c94960ae50e523ae2ac707) is 6.0M, max 48.4M, 42.4M free. May 13 00:43:01.501000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:43:02.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:43:02.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:43:02.166000 audit: BPF prog-id=10 op=LOAD May 13 00:43:02.166000 audit: BPF prog-id=10 op=UNLOAD May 13 00:43:02.167000 audit: BPF prog-id=11 op=LOAD May 13 00:43:02.167000 audit: BPF prog-id=11 op=UNLOAD May 13 00:43:02.198000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:43:02.198000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:02.198000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:43:02.199000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:43:02.199000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:02.199000 audit: CWD cwd="/" May 13 00:43:02.199000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:02.199000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:02.199000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:43:04.328000 audit: BPF prog-id=12 op=LOAD May 13 00:43:04.328000 audit: BPF prog-id=3 op=UNLOAD May 13 00:43:04.328000 audit: BPF prog-id=13 op=LOAD May 13 00:43:04.328000 audit: BPF prog-id=14 op=LOAD May 13 00:43:04.328000 audit: BPF prog-id=4 op=UNLOAD May 13 00:43:04.328000 audit: BPF prog-id=5 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=15 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=12 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=16 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=17 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=13 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=14 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=18 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=15 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=19 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=20 op=LOAD May 13 00:43:04.329000 audit: BPF prog-id=16 op=UNLOAD May 13 00:43:04.329000 audit: BPF prog-id=17 op=UNLOAD May 13 00:43:04.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.339000 audit: BPF prog-id=18 op=UNLOAD May 13 00:43:04.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.442000 audit: BPF prog-id=21 op=LOAD May 13 00:43:04.442000 audit: BPF prog-id=22 op=LOAD May 13 00:43:04.442000 audit: BPF prog-id=23 op=LOAD May 13 00:43:04.442000 audit: BPF prog-id=19 op=UNLOAD May 13 00:43:04.442000 audit: BPF prog-id=20 op=UNLOAD May 13 00:43:04.459000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:43:04.459000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffdade34a10 a2=4000 a3=7ffdade34aac items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:04.459000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:43:04.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.326660 systemd[1]: Queued start job for default target multi-user.target. May 13 00:43:02.196871 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:43:04.326669 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:43:02.197099 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:43:04.330299 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:43:02.197116 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:43:02.197145 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:43:02.197154 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:43:02.197185 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:43:02.197196 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:43:02.197391 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:43:02.197426 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:43:02.197439 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:43:02.198003 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:43:02.198037 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:43:02.198053 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:43:02.198066 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:43:02.198094 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:43:04.465114 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:02.198106 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:43:04.061596 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:43:04.061880 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:43:04.061975 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:43:04.062179 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:43:04.062229 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:43:04.062283 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-13T00:43:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:43:04.468195 systemd[1]: Started systemd-journald.service. May 13 00:43:04.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.468774 systemd[1]: Mounted dev-hugepages.mount. May 13 00:43:04.469568 systemd[1]: Mounted dev-mqueue.mount. May 13 00:43:04.470338 systemd[1]: Mounted media.mount. May 13 00:43:04.471048 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:43:04.471886 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:43:04.472744 systemd[1]: Mounted tmp.mount. May 13 00:43:04.473542 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:43:04.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.474608 systemd[1]: Finished kmod-static-nodes.service. May 13 00:43:04.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.475655 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:43:04.475827 systemd[1]: Finished modprobe@configfs.service. May 13 00:43:04.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.476887 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:43:04.477038 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:43:04.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.478125 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:43:04.478286 systemd[1]: Finished modprobe@drm.service. May 13 00:43:04.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.479309 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:43:04.479460 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:43:04.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.480526 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:43:04.480676 systemd[1]: Finished modprobe@fuse.service. May 13 00:43:04.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.481672 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:43:04.481837 systemd[1]: Finished modprobe@loop.service. May 13 00:43:04.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.482895 systemd[1]: Finished systemd-modules-load.service. May 13 00:43:04.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.483978 systemd[1]: Finished systemd-network-generator.service. May 13 00:43:04.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.485152 systemd[1]: Finished systemd-remount-fs.service. May 13 00:43:04.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.486410 systemd[1]: Reached target network-pre.target. May 13 00:43:04.488216 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:43:04.490040 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:43:04.491042 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:43:04.492942 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:43:04.495492 systemd[1]: Starting systemd-journal-flush.service... May 13 00:43:04.496509 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:43:04.499672 systemd[1]: Starting systemd-random-seed.service... May 13 00:43:04.500528 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:43:04.501681 systemd[1]: Starting systemd-sysctl.service... May 13 00:43:04.502944 systemd-journald[989]: Time spent on flushing to /var/log/journal/f54058e4a7c94960ae50e523ae2ac707 is 18.032ms for 1170 entries. May 13 00:43:04.502944 systemd-journald[989]: System Journal (/var/log/journal/f54058e4a7c94960ae50e523ae2ac707) is 8.0M, max 195.6M, 187.6M free. May 13 00:43:04.794453 systemd-journald[989]: Received client request to flush runtime journal. May 13 00:43:04.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:04.503898 systemd[1]: Starting systemd-sysusers.service... May 13 00:43:04.509147 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:43:04.795372 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:43:04.525386 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:43:04.541048 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:43:04.652254 systemd[1]: Starting systemd-udev-settle.service... May 13 00:43:04.657752 systemd[1]: Finished systemd-sysctl.service. May 13 00:43:04.663331 systemd[1]: Finished systemd-sysusers.service. May 13 00:43:04.687647 systemd[1]: Finished systemd-random-seed.service. May 13 00:43:04.688706 systemd[1]: Reached target first-boot-complete.target. May 13 00:43:04.690803 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:43:04.706758 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:43:04.795613 systemd[1]: Finished systemd-journal-flush.service. May 13 00:43:04.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.440263 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:43:05.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.442000 audit: BPF prog-id=24 op=LOAD May 13 00:43:05.442000 audit: BPF prog-id=25 op=LOAD May 13 00:43:05.442000 audit: BPF prog-id=7 op=UNLOAD May 13 00:43:05.442000 audit: BPF prog-id=8 op=UNLOAD May 13 00:43:05.442849 systemd[1]: Starting systemd-udevd.service... May 13 00:43:05.465107 systemd-udevd[1016]: Using default interface naming scheme 'v252'. May 13 00:43:05.479960 systemd[1]: Started systemd-udevd.service. May 13 00:43:05.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.482000 audit: BPF prog-id=26 op=LOAD May 13 00:43:05.482982 systemd[1]: Starting systemd-networkd.service... May 13 00:43:05.489004 systemd[1]: Starting systemd-userdbd.service... May 13 00:43:05.488000 audit: BPF prog-id=27 op=LOAD May 13 00:43:05.488000 audit: BPF prog-id=28 op=LOAD May 13 00:43:05.488000 audit: BPF prog-id=29 op=LOAD May 13 00:43:05.522402 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:43:05.525306 systemd[1]: Started systemd-userdbd.service. May 13 00:43:05.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.527395 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:43:05.560107 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:43:05.566097 kernel: ACPI: button: Power Button [PWRF] May 13 00:43:05.577011 systemd-networkd[1023]: lo: Link UP May 13 00:43:05.577405 systemd-networkd[1023]: lo: Gained carrier May 13 00:43:05.577872 systemd-networkd[1023]: Enumeration completed May 13 00:43:05.578023 systemd[1]: Started systemd-networkd.service. May 13 00:43:05.578934 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:43:05.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.580360 systemd-networkd[1023]: eth0: Link UP May 13 00:43:05.580368 systemd-networkd[1023]: eth0: Gained carrier May 13 00:43:05.583000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:43:05.597258 systemd-networkd[1023]: eth0: DHCPv4 address 10.0.0.77/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:43:05.583000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5573016216a0 a1=338ac a2=7ff3ef6b8bc5 a3=5 items=110 ppid=1016 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:05.583000 audit: CWD cwd="/" May 13 00:43:05.583000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=1 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=2 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=3 name=(null) inode=15910 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=4 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=5 name=(null) inode=15911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=6 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=7 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=8 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.616094 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 13 00:43:05.620494 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:43:05.620611 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:43:05.620741 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:43:05.583000 audit: PATH item=9 name=(null) inode=15913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=10 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=11 name=(null) inode=15914 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=12 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=13 name=(null) inode=15915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=14 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=15 name=(null) inode=15916 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=16 name=(null) inode=15912 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=17 name=(null) inode=15917 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=18 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=19 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=20 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=21 name=(null) inode=15919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=22 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=23 name=(null) inode=15920 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=24 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=25 name=(null) inode=15921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=26 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=27 name=(null) inode=15922 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=28 name=(null) inode=15918 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=29 name=(null) inode=15923 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=30 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=31 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=32 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=33 name=(null) inode=15925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=34 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=35 name=(null) inode=15926 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=36 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=37 name=(null) inode=15927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=38 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=39 name=(null) inode=15928 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=40 name=(null) inode=15924 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=41 name=(null) inode=15929 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=42 name=(null) inode=15909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=43 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=44 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=45 name=(null) inode=15931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=46 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=47 name=(null) inode=15932 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=48 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=49 name=(null) inode=15933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=50 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=51 name=(null) inode=15934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=52 name=(null) inode=15930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=53 name=(null) inode=15935 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=55 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=56 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=57 name=(null) inode=15937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=58 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=59 name=(null) inode=15938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=60 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=61 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=62 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=63 name=(null) inode=15940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=64 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=65 name=(null) inode=15941 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=66 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=67 name=(null) inode=15942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=68 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=69 name=(null) inode=15943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=70 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=71 name=(null) inode=15944 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=72 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=73 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=74 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=75 name=(null) inode=15946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=76 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=77 name=(null) inode=15947 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=78 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=79 name=(null) inode=15948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=80 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=81 name=(null) inode=15949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=82 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=83 name=(null) inode=15950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=84 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=85 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=86 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=87 name=(null) inode=15952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=88 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=89 name=(null) inode=15953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=90 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=91 name=(null) inode=15954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=92 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=93 name=(null) inode=15955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=94 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=95 name=(null) inode=15956 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=96 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=97 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=98 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=99 name=(null) inode=15958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=100 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=101 name=(null) inode=15959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=102 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=103 name=(null) inode=15960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=104 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=105 name=(null) inode=15961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=106 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=107 name=(null) inode=15962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PATH item=109 name=(null) inode=15965 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:05.583000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:43:05.629098 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:43:05.634095 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:43:05.683419 kernel: kvm: Nested Virtualization enabled May 13 00:43:05.683533 kernel: SVM: kvm: Nested Paging enabled May 13 00:43:05.683578 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:43:05.684200 kernel: SVM: Virtual GIF supported May 13 00:43:05.699116 kernel: EDAC MC: Ver: 3.0.0 May 13 00:43:05.723576 systemd[1]: Finished systemd-udev-settle.service. May 13 00:43:05.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.726313 systemd[1]: Starting lvm2-activation-early.service... May 13 00:43:05.739047 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:43:05.766872 systemd[1]: Finished lvm2-activation-early.service. May 13 00:43:05.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.773774 systemd[1]: Reached target cryptsetup.target. May 13 00:43:05.776061 systemd[1]: Starting lvm2-activation.service... May 13 00:43:05.779297 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:43:05.804935 systemd[1]: Finished lvm2-activation.service. May 13 00:43:05.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.825507 systemd[1]: Reached target local-fs-pre.target. May 13 00:43:05.826508 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:43:05.826528 systemd[1]: Reached target local-fs.target. May 13 00:43:05.827434 systemd[1]: Reached target machines.target. May 13 00:43:05.829653 systemd[1]: Starting ldconfig.service... May 13 00:43:05.830984 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:43:05.831029 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:05.832149 systemd[1]: Starting systemd-boot-update.service... May 13 00:43:05.836303 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:43:05.838853 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:43:05.840996 systemd[1]: Starting systemd-sysext.service... May 13 00:43:05.846788 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1056 (bootctl) May 13 00:43:05.848220 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:43:05.853677 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:43:05.859365 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:43:05.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.862059 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:43:05.862308 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:43:05.888942 systemd-fsck[1064]: fsck.fat 4.2 (2021-01-31) May 13 00:43:05.888942 systemd-fsck[1064]: /dev/vda1: 791 files, 120712/258078 clusters May 13 00:43:05.890653 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:43:05.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:05.893605 systemd[1]: Mounting boot.mount... May 13 00:43:05.901099 kernel: loop0: detected capacity change from 0 to 205544 May 13 00:43:06.317475 systemd[1]: Mounted boot.mount. May 13 00:43:06.329103 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:43:06.329644 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:43:06.330981 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:43:06.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.332618 systemd[1]: Finished systemd-boot-update.service. May 13 00:43:06.333160 kernel: kauditd_printk_skb: 231 callbacks suppressed May 13 00:43:06.333254 kernel: audit: type=1130 audit(1747096986.332:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.343205 kernel: audit: type=1130 audit(1747096986.338:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.354100 kernel: loop1: detected capacity change from 0 to 205544 May 13 00:43:06.361832 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 13 00:43:06.362379 (sd-sysext)[1069]: Merged extensions into '/usr'. May 13 00:43:06.379369 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:06.380746 systemd[1]: Mounting usr-share-oem.mount... May 13 00:43:06.383103 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:43:06.384618 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:43:06.388880 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:43:06.391315 systemd[1]: Starting modprobe@loop.service... May 13 00:43:06.392319 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:43:06.392484 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:06.392623 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:06.395845 systemd[1]: Mounted usr-share-oem.mount. May 13 00:43:06.397176 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:43:06.397329 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:43:06.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.398882 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:43:06.399029 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:43:06.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.402100 kernel: audit: type=1130 audit(1747096986.398:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.402210 kernel: audit: type=1131 audit(1747096986.398:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.406838 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:43:06.406938 systemd[1]: Finished modprobe@loop.service. May 13 00:43:06.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.410114 kernel: audit: type=1130 audit(1747096986.406:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.410164 kernel: audit: type=1131 audit(1747096986.406:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.415842 systemd[1]: Finished systemd-sysext.service. May 13 00:43:06.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.419102 kernel: audit: type=1130 audit(1747096986.414:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.419148 kernel: audit: type=1131 audit(1747096986.414:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.421902 ldconfig[1055]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:43:06.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.424922 systemd[1]: Starting ensure-sysext.service... May 13 00:43:06.430168 kernel: audit: type=1130 audit(1747096986.423:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.427367 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:43:06.427424 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:43:06.428655 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:43:06.430987 systemd[1]: Finished ldconfig.service. May 13 00:43:06.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.433901 systemd[1]: Reloading. May 13 00:43:06.435090 kernel: audit: type=1130 audit(1747096986.431:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.443111 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:43:06.444271 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:43:06.445758 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:43:06.505242 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-13T00:43:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:43:06.505275 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-13T00:43:06Z" level=info msg="torcx already run" May 13 00:43:06.566993 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:43:06.567011 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:43:06.584405 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:43:06.637000 audit: BPF prog-id=30 op=LOAD May 13 00:43:06.637000 audit: BPF prog-id=21 op=UNLOAD May 13 00:43:06.637000 audit: BPF prog-id=31 op=LOAD May 13 00:43:06.637000 audit: BPF prog-id=32 op=LOAD May 13 00:43:06.637000 audit: BPF prog-id=22 op=UNLOAD May 13 00:43:06.637000 audit: BPF prog-id=23 op=UNLOAD May 13 00:43:06.640000 audit: BPF prog-id=33 op=LOAD May 13 00:43:06.640000 audit: BPF prog-id=26 op=UNLOAD May 13 00:43:06.640000 audit: BPF prog-id=34 op=LOAD May 13 00:43:06.640000 audit: BPF prog-id=27 op=UNLOAD May 13 00:43:06.640000 audit: BPF prog-id=35 op=LOAD May 13 00:43:06.640000 audit: BPF prog-id=36 op=LOAD May 13 00:43:06.640000 audit: BPF prog-id=28 op=UNLOAD May 13 00:43:06.640000 audit: BPF prog-id=29 op=UNLOAD May 13 00:43:06.641000 audit: BPF prog-id=37 op=LOAD May 13 00:43:06.641000 audit: BPF prog-id=38 op=LOAD May 13 00:43:06.641000 audit: BPF prog-id=24 op=UNLOAD May 13 00:43:06.641000 audit: BPF prog-id=25 op=UNLOAD May 13 00:43:06.643011 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:43:06.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.647573 systemd[1]: Starting audit-rules.service... May 13 00:43:06.649294 systemd[1]: Starting clean-ca-certificates.service... May 13 00:43:06.652000 audit: BPF prog-id=39 op=LOAD May 13 00:43:06.651307 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:43:06.653623 systemd[1]: Starting systemd-resolved.service... May 13 00:43:06.655000 audit: BPF prog-id=40 op=LOAD May 13 00:43:06.656565 systemd[1]: Starting systemd-timesyncd.service... May 13 00:43:06.658432 systemd[1]: Starting systemd-update-utmp.service... May 13 00:43:06.659880 systemd[1]: Finished clean-ca-certificates.service. May 13 00:43:06.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.662000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:43:06.669912 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:43:06.674263 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:43:06.676729 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:43:06.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.679191 systemd[1]: Starting modprobe@loop.service... May 13 00:43:06.680179 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:43:06.680340 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:06.680483 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:43:06.681708 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:43:06.683383 systemd[1]: Finished systemd-update-utmp.service. May 13 00:43:06.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.684927 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:43:06.685058 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:43:06.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.686376 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:43:06.686484 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:43:06.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.687763 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:43:06.687873 systemd[1]: Finished modprobe@loop.service. May 13 00:43:06.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:06.689787 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:43:06.689881 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:43:06.691368 systemd[1]: Starting systemd-update-done.service... May 13 00:43:06.693775 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:43:06.695370 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:43:06.697583 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:43:06.699514 systemd[1]: Starting modprobe@loop.service... May 13 00:43:06.700408 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:43:06.700509 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:06.700590 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:43:06.700000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:43:06.700000 audit[1163]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc61c76bc0 a2=420 a3=0 items=0 ppid=1139 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:06.700000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:43:06.700781 augenrules[1163]: No rules May 13 00:43:06.701568 systemd[1]: Finished audit-rules.service. May 13 00:43:06.702685 systemd[1]: Finished systemd-update-done.service. May 13 00:43:06.703935 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:43:06.704040 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:43:06.705343 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:43:06.705480 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:43:06.706877 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:43:06.706999 systemd[1]: Finished modprobe@loop.service. May 13 00:43:06.708357 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:43:06.708494 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:43:06.711060 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:43:06.712250 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:43:06.714306 systemd[1]: Starting modprobe@drm.service... May 13 00:43:06.716282 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:43:06.718162 systemd[1]: Starting modprobe@loop.service... May 13 00:43:06.719026 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:43:06.719208 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:06.721852 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:43:06.722842 systemd-resolved[1145]: Positive Trust Anchors: May 13 00:43:06.722890 systemd-resolved[1145]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:43:06.722917 systemd-resolved[1145]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:43:06.722960 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:43:07.819780 systemd-timesyncd[1149]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:43:07.819841 systemd-timesyncd[1149]: Initial clock synchronization to Tue 2025-05-13 00:43:07.819676 UTC. May 13 00:43:07.820383 systemd[1]: Started systemd-timesyncd.service. May 13 00:43:07.822031 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:43:07.822169 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:43:07.823535 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:43:07.823637 systemd[1]: Finished modprobe@drm.service. May 13 00:43:07.824922 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:43:07.825026 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:43:07.826364 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:43:07.826463 systemd[1]: Finished modprobe@loop.service. May 13 00:43:07.827851 systemd[1]: Reached target time-set.target. May 13 00:43:07.828787 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:43:07.828817 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:43:07.829065 systemd[1]: Finished ensure-sysext.service. May 13 00:43:07.829781 systemd-resolved[1145]: Defaulting to hostname 'linux'. May 13 00:43:07.831298 systemd[1]: Started systemd-resolved.service. May 13 00:43:07.832175 systemd[1]: Reached target network.target. May 13 00:43:07.833089 systemd[1]: Reached target nss-lookup.target. May 13 00:43:07.833937 systemd[1]: Reached target sysinit.target. May 13 00:43:07.834827 systemd[1]: Started motdgen.path. May 13 00:43:07.835566 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:43:07.836845 systemd[1]: Started logrotate.timer. May 13 00:43:07.837804 systemd[1]: Started mdadm.timer. May 13 00:43:07.838510 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:43:07.839388 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:43:07.839407 systemd[1]: Reached target paths.target. May 13 00:43:07.840170 systemd[1]: Reached target timers.target. May 13 00:43:07.841268 systemd[1]: Listening on dbus.socket. May 13 00:43:07.842944 systemd[1]: Starting docker.socket... May 13 00:43:07.846198 systemd[1]: Listening on sshd.socket. May 13 00:43:07.847016 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:07.847349 systemd[1]: Listening on docker.socket. May 13 00:43:07.848133 systemd[1]: Reached target sockets.target. May 13 00:43:07.848909 systemd[1]: Reached target basic.target. May 13 00:43:07.849691 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:43:07.849716 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:43:07.850448 systemd[1]: Starting containerd.service... May 13 00:43:07.852030 systemd[1]: Starting dbus.service... May 13 00:43:07.853463 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:43:07.855244 systemd[1]: Starting extend-filesystems.service... May 13 00:43:07.856089 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:43:07.856947 systemd[1]: Starting motdgen.service... May 13 00:43:07.858494 systemd[1]: Starting prepare-helm.service... May 13 00:43:07.859604 jq[1181]: false May 13 00:43:07.860091 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:43:07.861715 systemd[1]: Starting sshd-keygen.service... May 13 00:43:07.864478 systemd[1]: Starting systemd-logind.service... May 13 00:43:07.865278 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:43:07.865347 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:43:07.865719 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:43:07.866287 systemd[1]: Starting update-engine.service... May 13 00:43:07.867882 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:43:07.870073 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:43:07.870890 jq[1192]: true May 13 00:43:07.870250 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:43:07.871137 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:43:07.871295 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:43:07.883948 tar[1197]: linux-amd64/helm May 13 00:43:07.885937 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:43:07.886085 systemd[1]: Finished motdgen.service. May 13 00:43:07.886642 jq[1199]: true May 13 00:43:07.894099 dbus-daemon[1180]: [system] SELinux support is enabled May 13 00:43:07.894491 systemd[1]: Started dbus.service. May 13 00:43:07.897173 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:43:07.897197 systemd[1]: Reached target system-config.target. May 13 00:43:07.898219 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:43:07.898251 systemd[1]: Reached target user-config.target. May 13 00:43:07.904568 extend-filesystems[1182]: Found loop1 May 13 00:43:07.905646 extend-filesystems[1182]: Found sr0 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda May 13 00:43:07.905646 extend-filesystems[1182]: Found vda1 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda2 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda3 May 13 00:43:07.905646 extend-filesystems[1182]: Found usr May 13 00:43:07.905646 extend-filesystems[1182]: Found vda4 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda6 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda7 May 13 00:43:07.905646 extend-filesystems[1182]: Found vda9 May 13 00:43:07.905646 extend-filesystems[1182]: Checking size of /dev/vda9 May 13 00:43:07.965801 env[1200]: time="2025-05-13T00:43:07.931833975Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:43:07.959861 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:07.959904 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:43:07.973813 update_engine[1191]: I0513 00:43:07.973631 1191 main.cc:92] Flatcar Update Engine starting May 13 00:43:07.974371 extend-filesystems[1182]: Resized partition /dev/vda9 May 13 00:43:07.978762 systemd[1]: Started update-engine.service. May 13 00:43:07.979205 update_engine[1191]: I0513 00:43:07.978847 1191 update_check_scheduler.cc:74] Next update check in 5m23s May 13 00:43:07.981578 systemd[1]: Started locksmithd.service. May 13 00:43:07.982907 bash[1227]: Updated "/home/core/.ssh/authorized_keys" May 13 00:43:07.984372 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:43:07.984551 systemd-logind[1190]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:43:07.984576 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:43:07.986048 systemd-logind[1190]: New seat seat0. May 13 00:43:07.989756 extend-filesystems[1233]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:43:07.991859 systemd[1]: Started systemd-logind.service. May 13 00:43:07.996481 env[1200]: time="2025-05-13T00:43:07.996431492Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:43:07.996827 env[1200]: time="2025-05-13T00:43:07.996807317Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.003074 env[1200]: time="2025-05-13T00:43:08.003019469Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:43:08.003161 env[1200]: time="2025-05-13T00:43:08.003132481Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.004009 env[1200]: time="2025-05-13T00:43:08.003986443Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:43:08.004113 env[1200]: time="2025-05-13T00:43:08.004093043Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.004192 env[1200]: time="2025-05-13T00:43:08.004171830Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:43:08.004275 env[1200]: time="2025-05-13T00:43:08.004255878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.004428 env[1200]: time="2025-05-13T00:43:08.004400619Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.004692 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:43:08.004792 env[1200]: time="2025-05-13T00:43:08.004774661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:43:08.004994 env[1200]: time="2025-05-13T00:43:08.004974045Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:43:08.005082 env[1200]: time="2025-05-13T00:43:08.005065206Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:43:08.005212 env[1200]: time="2025-05-13T00:43:08.005179701Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:43:08.005318 env[1200]: time="2025-05-13T00:43:08.005298514Z" level=info msg="metadata content store policy set" policy=shared May 13 00:43:08.035761 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:43:08.055344 extend-filesystems[1233]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:43:08.055344 extend-filesystems[1233]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:43:08.055344 extend-filesystems[1233]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:43:08.060249 extend-filesystems[1182]: Resized filesystem in /dev/vda9 May 13 00:43:08.056827 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:43:08.056997 systemd[1]: Finished extend-filesystems.service. May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065380921Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065434532Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065446654Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065485467Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065501147Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065513049Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065524390Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065537505Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065553344Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065566539Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065578281Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065590534Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065753810Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:43:08.066262 env[1200]: time="2025-05-13T00:43:08.065840804Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066255752Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066328318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066343597Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066408939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066422344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066434076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066500691Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066525588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066537971Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066548521Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066562818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066586 env[1200]: time="2025-05-13T00:43:08.066576634Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:43:08.066831 env[1200]: time="2025-05-13T00:43:08.066796476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066831 env[1200]: time="2025-05-13T00:43:08.066813168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066870 env[1200]: time="2025-05-13T00:43:08.066825681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:43:08.066870 env[1200]: time="2025-05-13T00:43:08.066852531Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:43:08.066911 env[1200]: time="2025-05-13T00:43:08.066866097Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:43:08.066911 env[1200]: time="2025-05-13T00:43:08.066879171Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:43:08.066956 env[1200]: time="2025-05-13T00:43:08.066900992Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:43:08.066956 env[1200]: time="2025-05-13T00:43:08.066949022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:43:08.067207 env[1200]: time="2025-05-13T00:43:08.067158255Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:43:08.068101 env[1200]: time="2025-05-13T00:43:08.067230320Z" level=info msg="Connect containerd service" May 13 00:43:08.068101 env[1200]: time="2025-05-13T00:43:08.067262130Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:43:08.068101 env[1200]: time="2025-05-13T00:43:08.067991087Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:43:08.068186 env[1200]: time="2025-05-13T00:43:08.068110731Z" level=info msg="Start subscribing containerd event" May 13 00:43:08.068186 env[1200]: time="2025-05-13T00:43:08.068147991Z" level=info msg="Start recovering state" May 13 00:43:08.068271 env[1200]: time="2025-05-13T00:43:08.068257336Z" level=info msg="Start event monitor" May 13 00:43:08.068295 env[1200]: time="2025-05-13T00:43:08.068282734Z" level=info msg="Start snapshots syncer" May 13 00:43:08.068316 env[1200]: time="2025-05-13T00:43:08.068292562Z" level=info msg="Start cni network conf syncer for default" May 13 00:43:08.068316 env[1200]: time="2025-05-13T00:43:08.068301108Z" level=info msg="Start streaming server" May 13 00:43:08.068641 env[1200]: time="2025-05-13T00:43:08.068607102Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:43:08.068729 env[1200]: time="2025-05-13T00:43:08.068717880Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:43:08.071697 env[1200]: time="2025-05-13T00:43:08.069808686Z" level=info msg="containerd successfully booted in 0.139760s" May 13 00:43:08.069880 systemd[1]: Started containerd.service. May 13 00:43:08.076379 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:43:08.252240 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:43:08.285141 systemd[1]: Finished sshd-keygen.service. May 13 00:43:08.287947 systemd[1]: Starting issuegen.service... May 13 00:43:08.293740 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:43:08.293897 systemd[1]: Finished issuegen.service. May 13 00:43:08.296845 systemd[1]: Starting systemd-user-sessions.service... May 13 00:43:08.304467 systemd[1]: Finished systemd-user-sessions.service. May 13 00:43:08.306870 systemd[1]: Started getty@tty1.service. May 13 00:43:08.309315 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:43:08.310493 systemd[1]: Reached target getty.target. May 13 00:43:08.424557 tar[1197]: linux-amd64/LICENSE May 13 00:43:08.424869 tar[1197]: linux-amd64/README.md May 13 00:43:08.429022 systemd[1]: Finished prepare-helm.service. May 13 00:43:08.672822 systemd-networkd[1023]: eth0: Gained IPv6LL May 13 00:43:08.674635 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:43:08.675976 systemd[1]: Reached target network-online.target. May 13 00:43:08.678233 systemd[1]: Starting kubelet.service... May 13 00:43:09.640711 systemd[1]: Started kubelet.service. May 13 00:43:09.642022 systemd[1]: Reached target multi-user.target. May 13 00:43:09.644386 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:43:09.651845 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:43:09.652008 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:43:09.653156 systemd[1]: Startup finished in 823ms (kernel) + 4.597s (initrd) + 7.095s (userspace) = 12.516s. May 13 00:43:10.314743 kubelet[1261]: E0513 00:43:10.314644 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:43:10.316608 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:43:10.316747 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:43:10.316972 systemd[1]: kubelet.service: Consumed 1.508s CPU time. May 13 00:43:11.117781 systemd[1]: Created slice system-sshd.slice. May 13 00:43:11.118870 systemd[1]: Started sshd@0-10.0.0.77:22-10.0.0.1:35460.service. May 13 00:43:11.165210 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 35460 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.166920 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.177186 systemd-logind[1190]: New session 1 of user core. May 13 00:43:11.178099 systemd[1]: Created slice user-500.slice. May 13 00:43:11.179429 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:43:11.190535 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:43:11.192530 systemd[1]: Starting user@500.service... May 13 00:43:11.199392 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.287265 systemd[1273]: Queued start job for default target default.target. May 13 00:43:11.287804 systemd[1273]: Reached target paths.target. May 13 00:43:11.287824 systemd[1273]: Reached target sockets.target. May 13 00:43:11.287840 systemd[1273]: Reached target timers.target. May 13 00:43:11.287854 systemd[1273]: Reached target basic.target. May 13 00:43:11.287903 systemd[1273]: Reached target default.target. May 13 00:43:11.287935 systemd[1273]: Startup finished in 81ms. May 13 00:43:11.288008 systemd[1]: Started user@500.service. May 13 00:43:11.289144 systemd[1]: Started session-1.scope. May 13 00:43:11.341813 systemd[1]: Started sshd@1-10.0.0.77:22-10.0.0.1:35474.service. May 13 00:43:11.389450 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 35474 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.390459 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.393869 systemd-logind[1190]: New session 2 of user core. May 13 00:43:11.394843 systemd[1]: Started session-2.scope. May 13 00:43:11.449794 sshd[1282]: pam_unix(sshd:session): session closed for user core May 13 00:43:11.452171 systemd[1]: sshd@1-10.0.0.77:22-10.0.0.1:35474.service: Deactivated successfully. May 13 00:43:11.452676 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:43:11.453103 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. May 13 00:43:11.453947 systemd[1]: Started sshd@2-10.0.0.77:22-10.0.0.1:35476.service. May 13 00:43:11.454599 systemd-logind[1190]: Removed session 2. May 13 00:43:11.493806 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 35476 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.494760 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.498176 systemd-logind[1190]: New session 3 of user core. May 13 00:43:11.498878 systemd[1]: Started session-3.scope. May 13 00:43:11.547590 sshd[1288]: pam_unix(sshd:session): session closed for user core May 13 00:43:11.550947 systemd[1]: sshd@2-10.0.0.77:22-10.0.0.1:35476.service: Deactivated successfully. May 13 00:43:11.551659 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:43:11.552314 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. May 13 00:43:11.553714 systemd[1]: Started sshd@3-10.0.0.77:22-10.0.0.1:35490.service. May 13 00:43:11.554478 systemd-logind[1190]: Removed session 3. May 13 00:43:11.593703 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 35490 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.594577 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.597954 systemd-logind[1190]: New session 4 of user core. May 13 00:43:11.598941 systemd[1]: Started session-4.scope. May 13 00:43:11.653206 sshd[1294]: pam_unix(sshd:session): session closed for user core May 13 00:43:11.656023 systemd[1]: Started sshd@4-10.0.0.77:22-10.0.0.1:35498.service. May 13 00:43:11.656423 systemd[1]: sshd@3-10.0.0.77:22-10.0.0.1:35490.service: Deactivated successfully. May 13 00:43:11.656926 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:43:11.657533 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. May 13 00:43:11.658604 systemd-logind[1190]: Removed session 4. May 13 00:43:11.696298 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 35498 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.697181 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.700165 systemd-logind[1190]: New session 5 of user core. May 13 00:43:11.700899 systemd[1]: Started session-5.scope. May 13 00:43:11.755420 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:43:11.755638 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:43:11.768893 dbus-daemon[1180]: \xd0ݐqgU: received setenforce notice (enforcing=-1891572912) May 13 00:43:11.770774 sudo[1303]: pam_unix(sudo:session): session closed for user root May 13 00:43:11.772421 sshd[1299]: pam_unix(sshd:session): session closed for user core May 13 00:43:11.775992 systemd[1]: Started sshd@5-10.0.0.77:22-10.0.0.1:35510.service. May 13 00:43:11.776483 systemd[1]: sshd@4-10.0.0.77:22-10.0.0.1:35498.service: Deactivated successfully. May 13 00:43:11.777025 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:43:11.777589 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. May 13 00:43:11.778564 systemd-logind[1190]: Removed session 5. May 13 00:43:11.820047 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 35510 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.822059 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.826652 systemd-logind[1190]: New session 6 of user core. May 13 00:43:11.827710 systemd[1]: Started session-6.scope. May 13 00:43:11.880607 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:43:11.880825 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:43:11.883722 sudo[1311]: pam_unix(sudo:session): session closed for user root May 13 00:43:11.887867 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:43:11.888046 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:43:11.897010 systemd[1]: Stopping audit-rules.service... May 13 00:43:11.896000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:43:11.896000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1d0017e0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.896000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:43:11.898318 auditctl[1314]: No rules May 13 00:43:11.898427 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:43:11.898599 systemd[1]: Stopped audit-rules.service. May 13 00:43:11.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:11.900053 systemd[1]: Starting audit-rules.service... May 13 00:43:11.917307 augenrules[1331]: No rules May 13 00:43:11.918023 systemd[1]: Finished audit-rules.service. May 13 00:43:11.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:11.919021 sudo[1310]: pam_unix(sudo:session): session closed for user root May 13 00:43:11.917000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:11.917000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:11.920389 sshd[1306]: pam_unix(sshd:session): session closed for user core May 13 00:43:11.919000 audit[1306]: USER_END pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:11.919000 audit[1306]: CRED_DISP pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:11.922854 systemd[1]: sshd@5-10.0.0.77:22-10.0.0.1:35510.service: Deactivated successfully. May 13 00:43:11.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.77:22-10.0.0.1:35510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:11.923390 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:43:11.923846 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. May 13 00:43:11.924936 systemd[1]: Started sshd@6-10.0.0.77:22-10.0.0.1:35518.service. May 13 00:43:11.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.77:22-10.0.0.1:35518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:11.925638 systemd-logind[1190]: Removed session 6. May 13 00:43:11.966000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:11.968578 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 35518 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:43:11.967000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:11.967000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd392e8f40 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:11.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:43:11.969976 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:43:11.973862 systemd-logind[1190]: New session 7 of user core. May 13 00:43:11.974854 systemd[1]: Started session-7.scope. May 13 00:43:11.977000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:11.978000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:12.026000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:12.026000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:12.028425 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:43:12.028614 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:43:12.028000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:12.064837 systemd[1]: Starting docker.service... May 13 00:43:12.139634 env[1352]: time="2025-05-13T00:43:12.139568402Z" level=info msg="Starting up" May 13 00:43:12.141286 env[1352]: time="2025-05-13T00:43:12.141232113Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:43:12.141286 env[1352]: time="2025-05-13T00:43:12.141260326Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:43:12.141286 env[1352]: time="2025-05-13T00:43:12.141280133Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:43:12.141286 env[1352]: time="2025-05-13T00:43:12.141291073Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:43:12.143108 env[1352]: time="2025-05-13T00:43:12.143059871Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:43:12.143108 env[1352]: time="2025-05-13T00:43:12.143092422Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:43:12.143198 env[1352]: time="2025-05-13T00:43:12.143128981Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:43:12.143198 env[1352]: time="2025-05-13T00:43:12.143144350Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:43:12.871279 env[1352]: time="2025-05-13T00:43:12.871226574Z" level=info msg="Loading containers: start." May 13 00:43:12.920000 audit[1386]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.922904 kernel: kauditd_printk_skb: 55 callbacks suppressed May 13 00:43:12.922999 kernel: audit: type=1325 audit(1747096992.920:220): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.920000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd383ba900 a2=0 a3=7ffd383ba8ec items=0 ppid=1352 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.929626 kernel: audit: type=1300 audit(1747096992.920:220): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd383ba900 a2=0 a3=7ffd383ba8ec items=0 ppid=1352 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.929738 kernel: audit: type=1327 audit(1747096992.920:220): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:43:12.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:43:12.931470 kernel: audit: type=1325 audit(1747096992.922:221): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.922000 audit[1388]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.933570 kernel: audit: type=1300 audit(1747096992.922:221): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb7942f40 a2=0 a3=7ffeb7942f2c items=0 ppid=1352 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.922000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb7942f40 a2=0 a3=7ffeb7942f2c items=0 ppid=1352 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.937999 kernel: audit: type=1327 audit(1747096992.922:221): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:43:12.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:43:12.924000 audit[1390]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.942085 kernel: audit: type=1325 audit(1747096992.924:222): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.942135 kernel: audit: type=1300 audit(1747096992.924:222): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffff5e62280 a2=0 a3=7ffff5e6226c items=0 ppid=1352 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.924000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffff5e62280 a2=0 a3=7ffff5e6226c items=0 ppid=1352 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.947331 kernel: audit: type=1327 audit(1747096992.924:222): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:43:12.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:43:12.924000 audit[1392]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.952300 kernel: audit: type=1325 audit(1747096992.924:223): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.924000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcdfdcebd0 a2=0 a3=7ffcdfdcebbc items=0 ppid=1352 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:43:12.924000 audit[1394]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.924000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe89a77b90 a2=0 a3=7ffe89a77b7c items=0 ppid=1352 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:43:12.965000 audit[1399]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.965000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc37172a20 a2=0 a3=7ffc37172a0c items=0 ppid=1352 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:43:12.974000 audit[1401]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.974000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7d76da50 a2=0 a3=7ffe7d76da3c items=0 ppid=1352 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:43:12.976000 audit[1403]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.976000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc90e45ce0 a2=0 a3=7ffc90e45ccc items=0 ppid=1352 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:43:12.977000 audit[1405]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.977000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffea12c7550 a2=0 a3=7ffea12c753c items=0 ppid=1352 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:43:12.987000 audit[1409]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.987000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd81f53950 a2=0 a3=7ffd81f5393c items=0 ppid=1352 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:43:12.991000 audit[1410]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:12.991000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdeb8666c0 a2=0 a3=7ffdeb8666ac items=0 ppid=1352 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:12.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:43:13.005129 kernel: Initializing XFRM netlink socket May 13 00:43:13.034827 env[1352]: time="2025-05-13T00:43:13.034780945Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:43:13.049000 audit[1418]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.049000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdbf52d860 a2=0 a3=7ffdbf52d84c items=0 ppid=1352 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:43:13.061000 audit[1421]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.061000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff1893b340 a2=0 a3=7fff1893b32c items=0 ppid=1352 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:43:13.064000 audit[1424]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.064000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd4c100240 a2=0 a3=7ffd4c10022c items=0 ppid=1352 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.064000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:43:13.065000 audit[1426]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.065000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd6e007e40 a2=0 a3=7ffd6e007e2c items=0 ppid=1352 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.065000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:43:13.067000 audit[1428]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.067000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffff39d8d60 a2=0 a3=7ffff39d8d4c items=0 ppid=1352 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:43:13.073000 audit[1430]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.073000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff75b97cc0 a2=0 a3=7fff75b97cac items=0 ppid=1352 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:43:13.074000 audit[1432]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.074000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe6b3e3350 a2=0 a3=7ffe6b3e333c items=0 ppid=1352 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:43:13.080000 audit[1435]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.080000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff5187abb0 a2=0 a3=7fff5187ab9c items=0 ppid=1352 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:43:13.082000 audit[1437]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.082000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf905cff0 a2=0 a3=7ffdf905cfdc items=0 ppid=1352 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:43:13.084000 audit[1439]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.084000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd87f378c0 a2=0 a3=7ffd87f378ac items=0 ppid=1352 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:43:13.085000 audit[1441]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.085000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffed32f080 a2=0 a3=7fffed32f06c items=0 ppid=1352 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:43:13.087650 systemd-networkd[1023]: docker0: Link UP May 13 00:43:13.094000 audit[1445]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.094000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0c3f7ac0 a2=0 a3=7fff0c3f7aac items=0 ppid=1352 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:43:13.098000 audit[1446]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:13.098000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc459d0950 a2=0 a3=7ffc459d093c items=0 ppid=1352 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:13.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:43:13.100860 env[1352]: time="2025-05-13T00:43:13.100824825Z" level=info msg="Loading containers: done." May 13 00:43:13.129857 env[1352]: time="2025-05-13T00:43:13.129716898Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:43:13.130087 env[1352]: time="2025-05-13T00:43:13.129927132Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:43:13.130087 env[1352]: time="2025-05-13T00:43:13.130027581Z" level=info msg="Daemon has completed initialization" May 13 00:43:13.147052 systemd[1]: Started docker.service. May 13 00:43:13.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:13.153543 env[1352]: time="2025-05-13T00:43:13.153479039Z" level=info msg="API listen on /run/docker.sock" May 13 00:43:13.920392 env[1200]: time="2025-05-13T00:43:13.920343046Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 13 00:43:15.524491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1844287860.mount: Deactivated successfully. May 13 00:43:17.960176 env[1200]: time="2025-05-13T00:43:17.960102711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.962298 env[1200]: time="2025-05-13T00:43:17.962249257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.964295 env[1200]: time="2025-05-13T00:43:17.964243398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.965867 env[1200]: time="2025-05-13T00:43:17.965835985Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:17.966756 env[1200]: time="2025-05-13T00:43:17.966702330Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 13 00:43:17.968447 env[1200]: time="2025-05-13T00:43:17.968423759Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 13 00:43:20.183547 env[1200]: time="2025-05-13T00:43:20.183465634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:20.187279 env[1200]: time="2025-05-13T00:43:20.187233061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:20.192598 env[1200]: time="2025-05-13T00:43:20.192566144Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:20.194884 env[1200]: time="2025-05-13T00:43:20.194836553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:20.195482 env[1200]: time="2025-05-13T00:43:20.195449723Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 13 00:43:20.195961 env[1200]: time="2025-05-13T00:43:20.195937277Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 13 00:43:20.565883 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:43:20.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.566090 systemd[1]: Stopped kubelet.service. May 13 00:43:20.566162 systemd[1]: kubelet.service: Consumed 1.508s CPU time. May 13 00:43:20.567086 kernel: kauditd_printk_skb: 63 callbacks suppressed May 13 00:43:20.567157 kernel: audit: type=1130 audit(1747097000.564:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.567803 systemd[1]: Starting kubelet.service... May 13 00:43:20.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.573994 kernel: audit: type=1131 audit(1747097000.564:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.666891 systemd[1]: Started kubelet.service. May 13 00:43:20.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.670685 kernel: audit: type=1130 audit(1747097000.665:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:20.853362 kubelet[1487]: E0513 00:43:20.853223 1487 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:43:20.856144 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:43:20.856264 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:43:20.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:43:20.859696 kernel: audit: type=1131 audit(1747097000.854:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:43:23.109983 env[1200]: time="2025-05-13T00:43:23.109920858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:23.114429 env[1200]: time="2025-05-13T00:43:23.114393227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:23.117130 env[1200]: time="2025-05-13T00:43:23.117084635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:23.118967 env[1200]: time="2025-05-13T00:43:23.118933393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:23.119786 env[1200]: time="2025-05-13T00:43:23.119733293Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 13 00:43:23.120412 env[1200]: time="2025-05-13T00:43:23.120391949Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 00:43:24.366365 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1758704948.mount: Deactivated successfully. May 13 00:43:25.282402 env[1200]: time="2025-05-13T00:43:25.282340696Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.284326 env[1200]: time="2025-05-13T00:43:25.284275425Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.285911 env[1200]: time="2025-05-13T00:43:25.285873373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.287318 env[1200]: time="2025-05-13T00:43:25.287273539Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:25.287735 env[1200]: time="2025-05-13T00:43:25.287707152Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 00:43:25.288362 env[1200]: time="2025-05-13T00:43:25.288317317Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 00:43:25.867038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2941490562.mount: Deactivated successfully. May 13 00:43:27.715071 env[1200]: time="2025-05-13T00:43:27.715013195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:27.716932 env[1200]: time="2025-05-13T00:43:27.716860870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:27.718978 env[1200]: time="2025-05-13T00:43:27.718936554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:27.720745 env[1200]: time="2025-05-13T00:43:27.720717164Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:27.721447 env[1200]: time="2025-05-13T00:43:27.721406948Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 13 00:43:27.721917 env[1200]: time="2025-05-13T00:43:27.721895444Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:43:28.767058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2078125453.mount: Deactivated successfully. May 13 00:43:28.775140 env[1200]: time="2025-05-13T00:43:28.775090447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:28.777374 env[1200]: time="2025-05-13T00:43:28.777341479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:28.779062 env[1200]: time="2025-05-13T00:43:28.779015088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:28.780197 env[1200]: time="2025-05-13T00:43:28.780157531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:28.780580 env[1200]: time="2025-05-13T00:43:28.780550478Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 00:43:28.781133 env[1200]: time="2025-05-13T00:43:28.781110869Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 13 00:43:29.967416 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount524475090.mount: Deactivated successfully. May 13 00:43:31.065782 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:43:31.065962 systemd[1]: Stopped kubelet.service. May 13 00:43:31.073530 kernel: audit: type=1130 audit(1747097011.064:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.073645 kernel: audit: type=1131 audit(1747097011.064:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.067326 systemd[1]: Starting kubelet.service... May 13 00:43:31.148344 systemd[1]: Started kubelet.service. May 13 00:43:31.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.152693 kernel: audit: type=1130 audit(1747097011.146:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:31.330230 kubelet[1498]: E0513 00:43:31.330076 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:43:31.332341 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:43:31.332491 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:43:31.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:43:31.336689 kernel: audit: type=1131 audit(1747097011.331:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:43:32.685539 env[1200]: time="2025-05-13T00:43:32.685467406Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:32.687282 env[1200]: time="2025-05-13T00:43:32.687228950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:32.688940 env[1200]: time="2025-05-13T00:43:32.688910454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:32.690611 env[1200]: time="2025-05-13T00:43:32.690582551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:32.692108 env[1200]: time="2025-05-13T00:43:32.692070221Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 13 00:43:35.606118 systemd[1]: Stopped kubelet.service. May 13 00:43:35.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.608352 systemd[1]: Starting kubelet.service... May 13 00:43:35.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.612545 kernel: audit: type=1130 audit(1747097015.604:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.612694 kernel: audit: type=1131 audit(1747097015.604:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:35.632230 systemd[1]: Reloading. May 13 00:43:35.708248 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-13T00:43:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:43:35.708689 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-13T00:43:35Z" level=info msg="torcx already run" May 13 00:43:36.084267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:43:36.084282 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:43:36.101145 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:43:36.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.166433 kernel: audit: type=1400 audit(1747097016.158:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.166490 kernel: audit: type=1400 audit(1747097016.158:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.166512 kernel: audit: type=1400 audit(1747097016.159:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172241 kernel: audit: type=1400 audit(1747097016.159:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172280 kernel: audit: type=1400 audit(1747097016.159:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.178028 kernel: audit: type=1400 audit(1747097016.159:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.178077 kernel: audit: type=1400 audit(1747097016.159:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.180994 kernel: audit: type=1400 audit(1747097016.159:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.183870 kernel: audit: type=1400 audit(1747097016.159:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.186675 kernel: audit: type=1400 audit(1747097016.164:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit: BPF prog-id=46 op=LOAD May 13 00:43:36.164000 audit: BPF prog-id=30 op=UNLOAD May 13 00:43:36.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit: BPF prog-id=47 op=LOAD May 13 00:43:36.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.170000 audit: BPF prog-id=48 op=LOAD May 13 00:43:36.170000 audit: BPF prog-id=31 op=UNLOAD May 13 00:43:36.170000 audit: BPF prog-id=32 op=UNLOAD May 13 00:43:36.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit: BPF prog-id=49 op=LOAD May 13 00:43:36.173000 audit: BPF prog-id=41 op=UNLOAD May 13 00:43:36.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit: BPF prog-id=50 op=LOAD May 13 00:43:36.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.184000 audit: BPF prog-id=51 op=LOAD May 13 00:43:36.185000 audit: BPF prog-id=42 op=UNLOAD May 13 00:43:36.185000 audit: BPF prog-id=43 op=UNLOAD May 13 00:43:36.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.187000 audit: BPF prog-id=52 op=LOAD May 13 00:43:36.187000 audit: BPF prog-id=33 op=UNLOAD May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit: BPF prog-id=53 op=LOAD May 13 00:43:36.188000 audit: BPF prog-id=44 op=UNLOAD May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit: BPF prog-id=54 op=LOAD May 13 00:43:36.189000 audit: BPF prog-id=34 op=UNLOAD May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit: BPF prog-id=55 op=LOAD May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit: BPF prog-id=56 op=LOAD May 13 00:43:36.189000 audit: BPF prog-id=35 op=UNLOAD May 13 00:43:36.189000 audit: BPF prog-id=36 op=UNLOAD May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.189000 audit: BPF prog-id=57 op=LOAD May 13 00:43:36.189000 audit: BPF prog-id=39 op=UNLOAD May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit: BPF prog-id=58 op=LOAD May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.190000 audit: BPF prog-id=59 op=LOAD May 13 00:43:36.190000 audit: BPF prog-id=37 op=UNLOAD May 13 00:43:36.190000 audit: BPF prog-id=38 op=UNLOAD May 13 00:43:36.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.191000 audit: BPF prog-id=60 op=LOAD May 13 00:43:36.191000 audit: BPF prog-id=40 op=UNLOAD May 13 00:43:36.201514 systemd[1]: Started kubelet.service. May 13 00:43:36.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.203015 systemd[1]: Stopping kubelet.service... May 13 00:43:36.203325 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:43:36.203557 systemd[1]: Stopped kubelet.service. May 13 00:43:36.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.205245 systemd[1]: Starting kubelet.service... May 13 00:43:36.285337 systemd[1]: Started kubelet.service. May 13 00:43:36.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:36.334405 kubelet[1600]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:43:36.334405 kubelet[1600]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:43:36.334405 kubelet[1600]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:43:36.335339 kubelet[1600]: I0513 00:43:36.335297 1600 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:43:36.572574 kubelet[1600]: I0513 00:43:36.572507 1600 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:43:36.572835 kubelet[1600]: I0513 00:43:36.572618 1600 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:43:36.572940 kubelet[1600]: I0513 00:43:36.572915 1600 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:43:36.592627 kubelet[1600]: I0513 00:43:36.592332 1600 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:43:36.596256 kubelet[1600]: E0513 00:43:36.596223 1600 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.77:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:36.600276 kubelet[1600]: E0513 00:43:36.600218 1600 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:43:36.600276 kubelet[1600]: I0513 00:43:36.600262 1600 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:43:36.606129 kubelet[1600]: I0513 00:43:36.606105 1600 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:43:36.607171 kubelet[1600]: I0513 00:43:36.607146 1600 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:43:36.607359 kubelet[1600]: I0513 00:43:36.607325 1600 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:43:36.607559 kubelet[1600]: I0513 00:43:36.607349 1600 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:43:36.607653 kubelet[1600]: I0513 00:43:36.607575 1600 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:43:36.607653 kubelet[1600]: I0513 00:43:36.607584 1600 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:43:36.607818 kubelet[1600]: I0513 00:43:36.607804 1600 state_mem.go:36] "Initialized new in-memory state store" May 13 00:43:36.611235 kubelet[1600]: I0513 00:43:36.611180 1600 kubelet.go:408] "Attempting to sync node with API server" May 13 00:43:36.611235 kubelet[1600]: I0513 00:43:36.611205 1600 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:43:36.611235 kubelet[1600]: I0513 00:43:36.611241 1600 kubelet.go:314] "Adding apiserver pod source" May 13 00:43:36.611568 kubelet[1600]: I0513 00:43:36.611270 1600 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:43:36.624098 kubelet[1600]: W0513 00:43:36.624029 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:36.624193 kubelet[1600]: E0513 00:43:36.624114 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:36.630394 kubelet[1600]: W0513 00:43:36.630315 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:36.630394 kubelet[1600]: E0513 00:43:36.630385 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:36.631922 kubelet[1600]: I0513 00:43:36.631818 1600 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:43:36.635308 kubelet[1600]: I0513 00:43:36.635280 1600 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:43:36.635824 kubelet[1600]: W0513 00:43:36.635802 1600 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:43:36.636516 kubelet[1600]: I0513 00:43:36.636500 1600 server.go:1269] "Started kubelet" May 13 00:43:36.639839 kubelet[1600]: I0513 00:43:36.639718 1600 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:43:36.640486 kubelet[1600]: I0513 00:43:36.640260 1600 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:43:36.640486 kubelet[1600]: I0513 00:43:36.640421 1600 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:43:36.641829 kubelet[1600]: I0513 00:43:36.641503 1600 server.go:460] "Adding debug handlers to kubelet server" May 13 00:43:36.642187 kubelet[1600]: E0513 00:43:36.640970 1600 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.77:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.77:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef7ae8c2fba8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:43:36.636472232 +0000 UTC m=+0.340215498,LastTimestamp:2025-05-13 00:43:36.636472232 +0000 UTC m=+0.340215498,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:43:36.640000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.640000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:36.640000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab4ff0 a1=c00005bb00 a2=c000ab4fc0 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.640000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:36.642557 kubelet[1600]: I0513 00:43:36.642281 1600 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:43:36.642557 kubelet[1600]: E0513 00:43:36.642448 1600 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:43:36.640000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:36.640000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:36.640000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cef0c0 a1=c000c6c6c0 a2=c00094b080 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.640000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:36.643017 kubelet[1600]: I0513 00:43:36.642598 1600 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:43:36.643017 kubelet[1600]: I0513 00:43:36.642718 1600 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:43:36.643017 kubelet[1600]: I0513 00:43:36.642745 1600 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:43:36.643119 kubelet[1600]: I0513 00:43:36.643035 1600 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:43:36.643507 kubelet[1600]: I0513 00:43:36.643434 1600 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:43:36.643567 kubelet[1600]: I0513 00:43:36.643516 1600 reconciler.go:26] "Reconciler: start to sync state" May 13 00:43:36.643606 kubelet[1600]: E0513 00:43:36.643568 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:36.644194 kubelet[1600]: W0513 00:43:36.644139 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:36.644245 kubelet[1600]: E0513 00:43:36.644198 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:36.644626 kubelet[1600]: E0513 00:43:36.644585 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.77:6443: connect: connection refused" interval="200ms" May 13 00:43:36.644958 kubelet[1600]: I0513 00:43:36.644929 1600 factory.go:221] Registration of the systemd container factory successfully May 13 00:43:36.645107 kubelet[1600]: I0513 00:43:36.645077 1600 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:43:36.643000 audit[1612]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.643000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd7a08e30 a2=0 a3=7ffdd7a08e1c items=0 ppid=1600 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:43:36.646090 kubelet[1600]: I0513 00:43:36.646066 1600 factory.go:221] Registration of the containerd container factory successfully May 13 00:43:36.645000 audit[1613]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.645000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2e549560 a2=0 a3=7ffc2e54954c items=0 ppid=1600 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:43:36.648000 audit[1615]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.648000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccb3762a0 a2=0 a3=7ffccb37628c items=0 ppid=1600 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:43:36.649000 audit[1617]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.649000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffbe32c1a0 a2=0 a3=7fffbe32c18c items=0 ppid=1600 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:43:36.658822 kubelet[1600]: I0513 00:43:36.658797 1600 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:43:36.658822 kubelet[1600]: I0513 00:43:36.658812 1600 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:43:36.657000 audit[1622]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.657000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff4b6d09b0 a2=0 a3=7fff4b6d099c items=0 ppid=1600 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:43:36.659138 kubelet[1600]: I0513 00:43:36.658829 1600 state_mem.go:36] "Initialized new in-memory state store" May 13 00:43:36.659652 kubelet[1600]: I0513 00:43:36.659189 1600 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:43:36.659000 audit[1624]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:36.659000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffceb75fea0 a2=0 a3=7ffceb75fe8c items=0 ppid=1600 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:43:36.661368 kubelet[1600]: I0513 00:43:36.661308 1600 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:43:36.661368 kubelet[1600]: I0513 00:43:36.661330 1600 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:43:36.661368 kubelet[1600]: I0513 00:43:36.661360 1600 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:43:36.661457 kubelet[1600]: E0513 00:43:36.661395 1600 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:43:36.661000 audit[1625]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.661000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3c6b5c10 a2=0 a3=7fff3c6b5bfc items=0 ppid=1600 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:43:36.663202 kubelet[1600]: W0513 00:43:36.663135 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:36.663274 kubelet[1600]: E0513 00:43:36.663212 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:36.661000 audit[1629]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:36.661000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd60bee8d0 a2=0 a3=7ffd60bee8bc items=0 ppid=1600 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:43:36.662000 audit[1630]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.662000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb68bcba0 a2=0 a3=7ffcb68bcb8c items=0 ppid=1600 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:43:36.663000 audit[1633]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:36.663000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe9f8d80b0 a2=0 a3=7ffe9f8d809c items=0 ppid=1600 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:43:36.663000 audit[1635]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:36.663000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd072fea70 a2=0 a3=7ffd072fea5c items=0 ppid=1600 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:43:36.664000 audit[1634]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:36.664000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce968f810 a2=0 a3=7ffce968f7fc items=0 ppid=1600 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:36.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:43:36.744432 kubelet[1600]: E0513 00:43:36.744405 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:36.761815 kubelet[1600]: E0513 00:43:36.761732 1600 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:43:36.845044 kubelet[1600]: E0513 00:43:36.844956 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:36.845400 kubelet[1600]: E0513 00:43:36.845330 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.77:6443: connect: connection refused" interval="400ms" May 13 00:43:36.946042 kubelet[1600]: E0513 00:43:36.945963 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:36.962237 kubelet[1600]: E0513 00:43:36.962178 1600 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:43:37.046758 kubelet[1600]: E0513 00:43:37.046693 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:37.147882 kubelet[1600]: E0513 00:43:37.147733 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:37.246642 kubelet[1600]: E0513 00:43:37.246574 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.77:6443: connect: connection refused" interval="800ms" May 13 00:43:37.248762 kubelet[1600]: E0513 00:43:37.248698 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:37.349232 kubelet[1600]: E0513 00:43:37.349185 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:37.362389 kubelet[1600]: E0513 00:43:37.362339 1600 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:43:37.434200 kubelet[1600]: W0513 00:43:37.434051 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:37.434200 kubelet[1600]: E0513 00:43:37.434135 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:37.449754 kubelet[1600]: E0513 00:43:37.449717 1600 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:37.453373 kubelet[1600]: W0513 00:43:37.453342 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:37.453421 kubelet[1600]: E0513 00:43:37.453378 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:37.499254 kubelet[1600]: I0513 00:43:37.499212 1600 policy_none.go:49] "None policy: Start" May 13 00:43:37.500217 kubelet[1600]: I0513 00:43:37.500195 1600 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:43:37.500301 kubelet[1600]: I0513 00:43:37.500232 1600 state_mem.go:35] "Initializing new in-memory state store" May 13 00:43:37.507618 systemd[1]: Created slice kubepods.slice. May 13 00:43:37.512025 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:43:37.514585 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:43:37.524312 kubelet[1600]: I0513 00:43:37.524266 1600 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:43:37.522000 audit[1600]: AVC avc: denied { mac_admin } for pid=1600 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:37.522000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:37.522000 audit[1600]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000761dd0 a1=c000ef6378 a2=c000761da0 a3=25 items=0 ppid=1 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:37.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:37.524730 kubelet[1600]: I0513 00:43:37.524352 1600 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:43:37.524730 kubelet[1600]: I0513 00:43:37.524464 1600 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:43:37.524730 kubelet[1600]: I0513 00:43:37.524474 1600 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:43:37.529948 kubelet[1600]: E0513 00:43:37.529910 1600 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:43:37.529948 kubelet[1600]: I0513 00:43:37.529941 1600 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:43:37.626288 kubelet[1600]: I0513 00:43:37.626236 1600 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:37.626751 kubelet[1600]: E0513 00:43:37.626723 1600 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.77:6443/api/v1/nodes\": dial tcp 10.0.0.77:6443: connect: connection refused" node="localhost" May 13 00:43:37.739065 kubelet[1600]: W0513 00:43:37.738921 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:37.739065 kubelet[1600]: E0513 00:43:37.738997 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:37.813956 kubelet[1600]: W0513 00:43:37.813895 1600 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.77:6443: connect: connection refused May 13 00:43:37.813956 kubelet[1600]: E0513 00:43:37.813939 1600 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:37.828263 kubelet[1600]: I0513 00:43:37.828220 1600 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:37.828528 kubelet[1600]: E0513 00:43:37.828481 1600 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.77:6443/api/v1/nodes\": dial tcp 10.0.0.77:6443: connect: connection refused" node="localhost" May 13 00:43:38.047233 kubelet[1600]: E0513 00:43:38.047064 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.77:6443: connect: connection refused" interval="1.6s" May 13 00:43:38.171215 systemd[1]: Created slice kubepods-burstable-podca1c56be84a73c5309bfb89d606e1676.slice. May 13 00:43:38.190830 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 13 00:43:38.203017 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 13 00:43:38.230514 kubelet[1600]: I0513 00:43:38.230466 1600 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:38.230930 kubelet[1600]: E0513 00:43:38.230902 1600 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.77:6443/api/v1/nodes\": dial tcp 10.0.0.77:6443: connect: connection refused" node="localhost" May 13 00:43:38.255346 kubelet[1600]: I0513 00:43:38.255280 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:38.255346 kubelet[1600]: I0513 00:43:38.255339 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:38.255499 kubelet[1600]: I0513 00:43:38.255364 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:38.255499 kubelet[1600]: I0513 00:43:38.255386 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:38.255499 kubelet[1600]: I0513 00:43:38.255411 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:43:38.255499 kubelet[1600]: I0513 00:43:38.255435 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:38.255499 kubelet[1600]: I0513 00:43:38.255454 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:38.255725 kubelet[1600]: I0513 00:43:38.255471 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:38.255725 kubelet[1600]: I0513 00:43:38.255490 1600 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:38.488685 kubelet[1600]: E0513 00:43:38.488601 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:38.492034 env[1200]: time="2025-05-13T00:43:38.489688566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ca1c56be84a73c5309bfb89d606e1676,Namespace:kube-system,Attempt:0,}" May 13 00:43:38.501475 kubelet[1600]: E0513 00:43:38.501428 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:38.502088 env[1200]: time="2025-05-13T00:43:38.502035355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 13 00:43:38.505409 kubelet[1600]: E0513 00:43:38.505372 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:38.505821 env[1200]: time="2025-05-13T00:43:38.505796700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 13 00:43:38.732180 kubelet[1600]: E0513 00:43:38.732131 1600 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.77:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.77:6443: connect: connection refused" logger="UnhandledError" May 13 00:43:39.032950 kubelet[1600]: I0513 00:43:39.032902 1600 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:39.033265 kubelet[1600]: E0513 00:43:39.033229 1600 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.77:6443/api/v1/nodes\": dial tcp 10.0.0.77:6443: connect: connection refused" node="localhost" May 13 00:43:39.190267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount5159634.mount: Deactivated successfully. May 13 00:43:39.196207 env[1200]: time="2025-05-13T00:43:39.196156187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.197534 env[1200]: time="2025-05-13T00:43:39.197500719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.200287 env[1200]: time="2025-05-13T00:43:39.200255256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.202425 env[1200]: time="2025-05-13T00:43:39.202381264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.203816 env[1200]: time="2025-05-13T00:43:39.203769768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.204997 env[1200]: time="2025-05-13T00:43:39.204962465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.207222 env[1200]: time="2025-05-13T00:43:39.207188831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.234232 env[1200]: time="2025-05-13T00:43:39.234197632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.266012 env[1200]: time="2025-05-13T00:43:39.265955521Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.302139 env[1200]: time="2025-05-13T00:43:39.302011732Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.367934 env[1200]: time="2025-05-13T00:43:39.367860145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.370072 env[1200]: time="2025-05-13T00:43:39.370031137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:39.431781 env[1200]: time="2025-05-13T00:43:39.425691099Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:39.431781 env[1200]: time="2025-05-13T00:43:39.425749619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:39.431781 env[1200]: time="2025-05-13T00:43:39.425762022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:39.431781 env[1200]: time="2025-05-13T00:43:39.425936149Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3e99ff6bcb694f51d3978975026bec8f29dab5b65c5d4b4a7fbc34302b06066 pid=1645 runtime=io.containerd.runc.v2 May 13 00:43:39.448073 env[1200]: time="2025-05-13T00:43:39.447834123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:39.448073 env[1200]: time="2025-05-13T00:43:39.447878025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:39.448073 env[1200]: time="2025-05-13T00:43:39.447897502Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:39.451210 systemd[1]: Started cri-containerd-f3e99ff6bcb694f51d3978975026bec8f29dab5b65c5d4b4a7fbc34302b06066.scope. May 13 00:43:39.453782 env[1200]: time="2025-05-13T00:43:39.452535722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed49f9f37b2421e0dc7d73d2063db7697dee1796c3170b6926356d48cd2fdc41 pid=1660 runtime=io.containerd.runc.v2 May 13 00:43:39.460475 env[1200]: time="2025-05-13T00:43:39.460276702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:39.460475 env[1200]: time="2025-05-13T00:43:39.460319652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:39.460475 env[1200]: time="2025-05-13T00:43:39.460343016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:39.460773 env[1200]: time="2025-05-13T00:43:39.460719162Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9b9c4fda393582f3d4d15ea45787cef1a6b4c992c2a9562fc57d433c771f74b pid=1659 runtime=io.containerd.runc.v2 May 13 00:43:39.497290 systemd[1]: Started cri-containerd-ed49f9f37b2421e0dc7d73d2063db7697dee1796c3170b6926356d48cd2fdc41.scope. May 13 00:43:39.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.505000 audit: BPF prog-id=61 op=LOAD May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c9c48 a2=10 a3=1c items=0 ppid=1645 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653939666636626362363934663531643339373839373530323662 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c96b0 a2=3c a3=c items=0 ppid=1645 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653939666636626362363934663531643339373839373530323662 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.506000 audit: BPF prog-id=62 op=LOAD May 13 00:43:39.506000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c99d8 a2=78 a3=c000128550 items=0 ppid=1645 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653939666636626362363934663531643339373839373530323662 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit: BPF prog-id=63 op=LOAD May 13 00:43:39.507000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c9770 a2=78 a3=c000128598 items=0 ppid=1645 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653939666636626362363934663531643339373839373530323662 May 13 00:43:39.507000 audit: BPF prog-id=63 op=UNLOAD May 13 00:43:39.507000 audit: BPF prog-id=62 op=UNLOAD May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.507000 audit: BPF prog-id=64 op=LOAD May 13 00:43:39.507000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c9c30 a2=78 a3=c0001289a8 items=0 ppid=1645 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653939666636626362363934663531643339373839373530323662 May 13 00:43:39.540945 systemd[1]: Started cri-containerd-e9b9c4fda393582f3d4d15ea45787cef1a6b4c992c2a9562fc57d433c771f74b.scope. May 13 00:43:39.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit: BPF prog-id=65 op=LOAD May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1660 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343966396633376232343231653064633764373364323036336462 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1660 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343966396633376232343231653064633764373364323036336462 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit: BPF prog-id=66 op=LOAD May 13 00:43:39.551000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003844e0 items=0 ppid=1660 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343966396633376232343231653064633764373364323036336462 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit: BPF prog-id=67 op=LOAD May 13 00:43:39.551000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000384528 items=0 ppid=1660 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343966396633376232343231653064633764373364323036336462 May 13 00:43:39.551000 audit: BPF prog-id=67 op=UNLOAD May 13 00:43:39.551000 audit: BPF prog-id=66 op=UNLOAD May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.551000 audit: BPF prog-id=68 op=LOAD May 13 00:43:39.551000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000384938 items=0 ppid=1660 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343966396633376232343231653064633764373364323036336462 May 13 00:43:39.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.570000 audit: BPF prog-id=69 op=LOAD May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1659 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623963346664613339333538326633643464313565613435373837 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1659 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623963346664613339333538326633643464313565613435373837 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit: BPF prog-id=70 op=LOAD May 13 00:43:39.571000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000092bc0 items=0 ppid=1659 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623963346664613339333538326633643464313565613435373837 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.571000 audit: BPF prog-id=71 op=LOAD May 13 00:43:39.571000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000092c08 items=0 ppid=1659 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623963346664613339333538326633643464313565613435373837 May 13 00:43:39.571000 audit: BPF prog-id=71 op=UNLOAD May 13 00:43:39.572000 audit: BPF prog-id=70 op=UNLOAD May 13 00:43:39.572000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.572000 audit: BPF prog-id=72 op=LOAD May 13 00:43:39.572000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000093018 items=0 ppid=1659 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623963346664613339333538326633643464313565613435373837 May 13 00:43:39.577154 env[1200]: time="2025-05-13T00:43:39.577118884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"f3e99ff6bcb694f51d3978975026bec8f29dab5b65c5d4b4a7fbc34302b06066\"" May 13 00:43:39.581706 kubelet[1600]: E0513 00:43:39.581331 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:39.585880 env[1200]: time="2025-05-13T00:43:39.585849781Z" level=info msg="CreateContainer within sandbox \"f3e99ff6bcb694f51d3978975026bec8f29dab5b65c5d4b4a7fbc34302b06066\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:43:39.587814 env[1200]: time="2025-05-13T00:43:39.587792064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"ed49f9f37b2421e0dc7d73d2063db7697dee1796c3170b6926356d48cd2fdc41\"" May 13 00:43:39.588368 kubelet[1600]: E0513 00:43:39.588346 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:39.589521 env[1200]: time="2025-05-13T00:43:39.589499747Z" level=info msg="CreateContainer within sandbox \"ed49f9f37b2421e0dc7d73d2063db7697dee1796c3170b6926356d48cd2fdc41\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:43:39.596835 env[1200]: time="2025-05-13T00:43:39.596802014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ca1c56be84a73c5309bfb89d606e1676,Namespace:kube-system,Attempt:0,} returns sandbox id \"e9b9c4fda393582f3d4d15ea45787cef1a6b4c992c2a9562fc57d433c771f74b\"" May 13 00:43:39.597557 kubelet[1600]: E0513 00:43:39.597522 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:39.598841 env[1200]: time="2025-05-13T00:43:39.598802346Z" level=info msg="CreateContainer within sandbox \"e9b9c4fda393582f3d4d15ea45787cef1a6b4c992c2a9562fc57d433c771f74b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:43:39.609021 env[1200]: time="2025-05-13T00:43:39.608991428Z" level=info msg="CreateContainer within sandbox \"f3e99ff6bcb694f51d3978975026bec8f29dab5b65c5d4b4a7fbc34302b06066\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3c555534433fff5641a005fa3c98f44868dbff185c1e9e66a7364386d5e22f27\"" May 13 00:43:39.609718 env[1200]: time="2025-05-13T00:43:39.609641287Z" level=info msg="StartContainer for \"3c555534433fff5641a005fa3c98f44868dbff185c1e9e66a7364386d5e22f27\"" May 13 00:43:39.615107 env[1200]: time="2025-05-13T00:43:39.615071873Z" level=info msg="CreateContainer within sandbox \"ed49f9f37b2421e0dc7d73d2063db7697dee1796c3170b6926356d48cd2fdc41\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"0e08837bc5c250b427d44da5857f6ebfc8e8253d0176410be66e571d0b6d9aeb\"" May 13 00:43:39.615501 env[1200]: time="2025-05-13T00:43:39.615461564Z" level=info msg="StartContainer for \"0e08837bc5c250b427d44da5857f6ebfc8e8253d0176410be66e571d0b6d9aeb\"" May 13 00:43:39.623591 env[1200]: time="2025-05-13T00:43:39.623537322Z" level=info msg="CreateContainer within sandbox \"e9b9c4fda393582f3d4d15ea45787cef1a6b4c992c2a9562fc57d433c771f74b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b908e1e80f151bdeaaa0f6aa9b9d26660d39e5df5724abcdb00c683b008cbd6d\"" May 13 00:43:39.624727 systemd[1]: Started cri-containerd-3c555534433fff5641a005fa3c98f44868dbff185c1e9e66a7364386d5e22f27.scope. May 13 00:43:39.626026 env[1200]: time="2025-05-13T00:43:39.625939458Z" level=info msg="StartContainer for \"b908e1e80f151bdeaaa0f6aa9b9d26660d39e5df5724abcdb00c683b008cbd6d\"" May 13 00:43:39.633577 systemd[1]: Started cri-containerd-0e08837bc5c250b427d44da5857f6ebfc8e8253d0176410be66e571d0b6d9aeb.scope. May 13 00:43:39.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.643000 audit: BPF prog-id=73 op=LOAD May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1645 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353535353334343333666666353634316130303566613363393866 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1645 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353535353334343333666666353634316130303566613363393866 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit: BPF prog-id=74 op=LOAD May 13 00:43:39.644000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000359d30 items=0 ppid=1645 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353535353334343333666666353634316130303566613363393866 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit: BPF prog-id=75 op=LOAD May 13 00:43:39.644000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000359d78 items=0 ppid=1645 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353535353334343333666666353634316130303566613363393866 May 13 00:43:39.644000 audit: BPF prog-id=75 op=UNLOAD May 13 00:43:39.644000 audit: BPF prog-id=74 op=UNLOAD May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.644000 audit: BPF prog-id=76 op=LOAD May 13 00:43:39.644000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003c0188 items=0 ppid=1645 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353535353334343333666666353634316130303566613363393866 May 13 00:43:39.646985 systemd[1]: Started cri-containerd-b908e1e80f151bdeaaa0f6aa9b9d26660d39e5df5724abcdb00c683b008cbd6d.scope. May 13 00:43:39.648368 kubelet[1600]: E0513 00:43:39.648094 1600 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.77:6443: connect: connection refused" interval="3.2s" May 13 00:43:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.653000 audit: BPF prog-id=77 op=LOAD May 13 00:43:39.654000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.654000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303838333762633563323530623432376434346461353835376636 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303838333762633563323530623432376434346461353835376636 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit: BPF prog-id=78 op=LOAD May 13 00:43:39.657000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002211f0 items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303838333762633563323530623432376434346461353835376636 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit: BPF prog-id=79 op=LOAD May 13 00:43:39.657000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221238 items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303838333762633563323530623432376434346461353835376636 May 13 00:43:39.657000 audit: BPF prog-id=79 op=UNLOAD May 13 00:43:39.657000 audit: BPF prog-id=78 op=UNLOAD May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.657000 audit: BPF prog-id=80 op=LOAD May 13 00:43:39.657000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221648 items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303838333762633563323530623432376434346461353835376636 May 13 00:43:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.671000 audit: BPF prog-id=81 op=LOAD May 13 00:43:39.672000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.672000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1659 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303865316538306631353162646561616130663661613962396432 May 13 00:43:39.672000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.672000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1659 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303865316538306631353162646561616130663661613962396432 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit: BPF prog-id=82 op=LOAD May 13 00:43:39.673000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025880 items=0 ppid=1659 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303865316538306631353162646561616130663661613962396432 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.673000 audit: BPF prog-id=83 op=LOAD May 13 00:43:39.673000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000258c8 items=0 ppid=1659 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303865316538306631353162646561616130663661613962396432 May 13 00:43:39.674000 audit: BPF prog-id=83 op=UNLOAD May 13 00:43:39.674000 audit: BPF prog-id=82 op=UNLOAD May 13 00:43:39.674000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:39.674000 audit: BPF prog-id=84 op=LOAD May 13 00:43:39.674000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025cd8 items=0 ppid=1659 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:39.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303865316538306631353162646561616130663661613962396432 May 13 00:43:39.680877 env[1200]: time="2025-05-13T00:43:39.680820419Z" level=info msg="StartContainer for \"3c555534433fff5641a005fa3c98f44868dbff185c1e9e66a7364386d5e22f27\" returns successfully" May 13 00:43:39.692246 env[1200]: time="2025-05-13T00:43:39.692203510Z" level=info msg="StartContainer for \"0e08837bc5c250b427d44da5857f6ebfc8e8253d0176410be66e571d0b6d9aeb\" returns successfully" May 13 00:43:39.714450 env[1200]: time="2025-05-13T00:43:39.714400005Z" level=info msg="StartContainer for \"b908e1e80f151bdeaaa0f6aa9b9d26660d39e5df5724abcdb00c683b008cbd6d\" returns successfully" May 13 00:43:40.391000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.391000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000ca0000 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:40.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:40.391000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.391000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000421940 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:40.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:40.635575 kubelet[1600]: I0513 00:43:40.635149 1600 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:40.684375 kubelet[1600]: E0513 00:43:40.684265 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:40.686617 kubelet[1600]: E0513 00:43:40.686600 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:40.688287 kubelet[1600]: E0513 00:43:40.688261 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:40.744000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.744000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00347e7e0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.744000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.745000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.745000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005cf0000 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.745000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.745000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.745000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00659e000 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.745000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.746000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.746000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0038ce780 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.746000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.747000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.747000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c004d27780 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.747000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.748000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:40.748000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c0039a7b30 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:43:40.748000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:43:40.913819 kubelet[1600]: I0513 00:43:40.913747 1600 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:43:41.630861 kubelet[1600]: I0513 00:43:41.630781 1600 apiserver.go:52] "Watching apiserver" May 13 00:43:41.643621 kubelet[1600]: I0513 00:43:41.643587 1600 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:43:41.693888 kubelet[1600]: E0513 00:43:41.693854 1600 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 13 00:43:41.693888 kubelet[1600]: E0513 00:43:41.693886 1600 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 13 00:43:41.694088 kubelet[1600]: E0513 00:43:41.693924 1600 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 13 00:43:41.694088 kubelet[1600]: E0513 00:43:41.694001 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:41.694088 kubelet[1600]: E0513 00:43:41.694046 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:41.694169 kubelet[1600]: E0513 00:43:41.694091 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:42.695498 kubelet[1600]: E0513 00:43:42.695451 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:42.696092 kubelet[1600]: E0513 00:43:42.696052 1600 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:43.223954 systemd[1]: Reloading. May 13 00:43:43.292992 /usr/lib/systemd/system-generators/torcx-generator[1895]: time="2025-05-13T00:43:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:43:43.293024 /usr/lib/systemd/system-generators/torcx-generator[1895]: time="2025-05-13T00:43:43Z" level=info msg="torcx already run" May 13 00:43:43.413430 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:43:43.413447 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:43:43.430371 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:43:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.501509 kernel: kauditd_printk_skb: 583 callbacks suppressed May 13 00:43:43.501577 kernel: audit: type=1400 audit(1747097023.498:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.507211 kernel: audit: type=1400 audit(1747097023.498:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.507355 kernel: audit: type=1400 audit(1747097023.498:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.513383 kernel: audit: type=1400 audit(1747097023.498:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.513449 kernel: audit: type=1400 audit(1747097023.498:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.516281 kernel: audit: type=1400 audit(1747097023.498:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.519196 kernel: audit: type=1400 audit(1747097023.499:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.522303 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:43:43.522354 kernel: audit: type=1400 audit(1747097023.499:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.523233 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 May 13 00:43:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit: BPF prog-id=85 op=LOAD May 13 00:43:43.502000 audit: BPF prog-id=46 op=UNLOAD May 13 00:43:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit: BPF prog-id=86 op=LOAD May 13 00:43:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.508000 audit: BPF prog-id=87 op=LOAD May 13 00:43:43.508000 audit: BPF prog-id=47 op=UNLOAD May 13 00:43:43.508000 audit: BPF prog-id=48 op=UNLOAD May 13 00:43:43.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.511000 audit: BPF prog-id=88 op=LOAD May 13 00:43:43.511000 audit: BPF prog-id=81 op=UNLOAD May 13 00:43:43.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.514000 audit: BPF prog-id=89 op=LOAD May 13 00:43:43.514000 audit: BPF prog-id=77 op=UNLOAD May 13 00:43:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.517000 audit: BPF prog-id=90 op=LOAD May 13 00:43:43.517000 audit: BPF prog-id=49 op=UNLOAD May 13 00:43:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit: BPF prog-id=91 op=LOAD May 13 00:43:43.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.525000 audit: BPF prog-id=92 op=LOAD May 13 00:43:43.525000 audit: BPF prog-id=50 op=UNLOAD May 13 00:43:43.525000 audit: BPF prog-id=51 op=UNLOAD May 13 00:43:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.528000 audit: BPF prog-id=93 op=LOAD May 13 00:43:43.528000 audit: BPF prog-id=73 op=UNLOAD May 13 00:43:43.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.529000 audit: BPF prog-id=94 op=LOAD May 13 00:43:43.529000 audit: BPF prog-id=65 op=UNLOAD May 13 00:43:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.530000 audit: BPF prog-id=95 op=LOAD May 13 00:43:43.530000 audit: BPF prog-id=52 op=UNLOAD May 13 00:43:43.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.531000 audit: BPF prog-id=96 op=LOAD May 13 00:43:43.531000 audit: BPF prog-id=61 op=UNLOAD May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit: BPF prog-id=97 op=LOAD May 13 00:43:43.532000 audit: BPF prog-id=53 op=UNLOAD May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.532000 audit: BPF prog-id=98 op=LOAD May 13 00:43:43.532000 audit: BPF prog-id=69 op=UNLOAD May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit: BPF prog-id=99 op=LOAD May 13 00:43:43.533000 audit: BPF prog-id=54 op=UNLOAD May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit: BPF prog-id=100 op=LOAD May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.533000 audit: BPF prog-id=101 op=LOAD May 13 00:43:43.533000 audit: BPF prog-id=55 op=UNLOAD May 13 00:43:43.533000 audit: BPF prog-id=56 op=UNLOAD May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit: BPF prog-id=102 op=LOAD May 13 00:43:43.534000 audit: BPF prog-id=57 op=UNLOAD May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit: BPF prog-id=103 op=LOAD May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.535000 audit: BPF prog-id=104 op=LOAD May 13 00:43:43.535000 audit: BPF prog-id=58 op=UNLOAD May 13 00:43:43.535000 audit: BPF prog-id=59 op=UNLOAD May 13 00:43:43.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.536000 audit: BPF prog-id=105 op=LOAD May 13 00:43:43.536000 audit: BPF prog-id=60 op=UNLOAD May 13 00:43:43.549405 systemd[1]: Stopping kubelet.service... May 13 00:43:43.575876 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:43:43.576030 systemd[1]: Stopped kubelet.service. May 13 00:43:43.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:43.577725 systemd[1]: Starting kubelet.service... May 13 00:43:43.656056 systemd[1]: Started kubelet.service. May 13 00:43:43.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:43.692515 kubelet[1940]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:43:43.692515 kubelet[1940]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:43:43.692515 kubelet[1940]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:43:43.693388 kubelet[1940]: I0513 00:43:43.692560 1940 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:43:43.700367 kubelet[1940]: I0513 00:43:43.700329 1940 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:43:43.700367 kubelet[1940]: I0513 00:43:43.700353 1940 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:43:43.700570 kubelet[1940]: I0513 00:43:43.700552 1940 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:43:43.702030 kubelet[1940]: I0513 00:43:43.701624 1940 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:43:43.703412 kubelet[1940]: I0513 00:43:43.703391 1940 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:43:43.710152 kubelet[1940]: E0513 00:43:43.710102 1940 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:43:43.710152 kubelet[1940]: I0513 00:43:43.710129 1940 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:43:43.714211 kubelet[1940]: I0513 00:43:43.714172 1940 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:43:43.714285 kubelet[1940]: I0513 00:43:43.714261 1940 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:43:43.714395 kubelet[1940]: I0513 00:43:43.714356 1940 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:43:43.714598 kubelet[1940]: I0513 00:43:43.714379 1940 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:43:43.714598 kubelet[1940]: I0513 00:43:43.714599 1940 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:43:43.714780 kubelet[1940]: I0513 00:43:43.714611 1940 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:43:43.714780 kubelet[1940]: I0513 00:43:43.714644 1940 state_mem.go:36] "Initialized new in-memory state store" May 13 00:43:43.714780 kubelet[1940]: I0513 00:43:43.714752 1940 kubelet.go:408] "Attempting to sync node with API server" May 13 00:43:43.714780 kubelet[1940]: I0513 00:43:43.714766 1940 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:43:43.714893 kubelet[1940]: I0513 00:43:43.714789 1940 kubelet.go:314] "Adding apiserver pod source" May 13 00:43:43.714893 kubelet[1940]: I0513 00:43:43.714801 1940 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:43:43.715620 kubelet[1940]: I0513 00:43:43.715522 1940 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:43:43.716624 kubelet[1940]: I0513 00:43:43.716606 1940 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:43:43.717812 kubelet[1940]: I0513 00:43:43.717798 1940 server.go:1269] "Started kubelet" May 13 00:43:43.719437 kubelet[1940]: I0513 00:43:43.719360 1940 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:43:43.719755 kubelet[1940]: I0513 00:43:43.719708 1940 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:43:43.719811 kubelet[1940]: I0513 00:43:43.719785 1940 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:43:43.720070 kubelet[1940]: E0513 00:43:43.720037 1940 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:43:43.718000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.718000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:43.718000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a72ba0 a1=c00013b758 a2=c000a72b70 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:43.718000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:43.718000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.718000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:43.718000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00043aba0 a1=c00013b770 a2=c000a72c30 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:43.718000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:43.720953 kubelet[1940]: I0513 00:43:43.720562 1940 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:43:43.720953 kubelet[1940]: I0513 00:43:43.720606 1940 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:43:43.720953 kubelet[1940]: I0513 00:43:43.720650 1940 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:43:43.721178 kubelet[1940]: I0513 00:43:43.721159 1940 server.go:460] "Adding debug handlers to kubelet server" May 13 00:43:43.722955 kubelet[1940]: I0513 00:43:43.722938 1940 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:43:43.723221 kubelet[1940]: I0513 00:43:43.723184 1940 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:43:43.724345 kubelet[1940]: E0513 00:43:43.724320 1940 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:43:43.728812 kubelet[1940]: I0513 00:43:43.728784 1940 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:43:43.734384 kubelet[1940]: I0513 00:43:43.734006 1940 reconciler.go:26] "Reconciler: start to sync state" May 13 00:43:43.735796 kubelet[1940]: I0513 00:43:43.735763 1940 factory.go:221] Registration of the containerd container factory successfully May 13 00:43:43.735796 kubelet[1940]: I0513 00:43:43.735787 1940 factory.go:221] Registration of the systemd container factory successfully May 13 00:43:43.735883 kubelet[1940]: I0513 00:43:43.735855 1940 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:43:43.736999 kubelet[1940]: I0513 00:43:43.736720 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:43:43.737815 kubelet[1940]: I0513 00:43:43.737800 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:43:43.737906 kubelet[1940]: I0513 00:43:43.737892 1940 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:43:43.738000 kubelet[1940]: I0513 00:43:43.737986 1940 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:43:43.738135 kubelet[1940]: E0513 00:43:43.738115 1940 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:43:43.765831 kubelet[1940]: I0513 00:43:43.765716 1940 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:43:43.765831 kubelet[1940]: I0513 00:43:43.765751 1940 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:43:43.765831 kubelet[1940]: I0513 00:43:43.765769 1940 state_mem.go:36] "Initialized new in-memory state store" May 13 00:43:43.766001 kubelet[1940]: I0513 00:43:43.765907 1940 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:43:43.766001 kubelet[1940]: I0513 00:43:43.765917 1940 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:43:43.766001 kubelet[1940]: I0513 00:43:43.765937 1940 policy_none.go:49] "None policy: Start" May 13 00:43:43.766570 kubelet[1940]: I0513 00:43:43.766555 1940 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:43:43.766623 kubelet[1940]: I0513 00:43:43.766578 1940 state_mem.go:35] "Initializing new in-memory state store" May 13 00:43:43.766763 kubelet[1940]: I0513 00:43:43.766753 1940 state_mem.go:75] "Updated machine memory state" May 13 00:43:43.774540 kubelet[1940]: I0513 00:43:43.774522 1940 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:43:43.772000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:43.772000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:43:43.772000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000530ae0 a1=c000920f00 a2=c000530a80 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:43.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:43:43.775132 kubelet[1940]: I0513 00:43:43.775113 1940 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:43:43.775332 kubelet[1940]: I0513 00:43:43.775319 1940 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:43:43.775448 kubelet[1940]: I0513 00:43:43.775412 1940 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:43:43.775764 kubelet[1940]: I0513 00:43:43.775754 1940 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:43:43.880062 kubelet[1940]: I0513 00:43:43.880022 1940 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:43:43.935423 kubelet[1940]: I0513 00:43:43.935382 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:43:43.935423 kubelet[1940]: I0513 00:43:43.935424 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:43.935589 kubelet[1940]: I0513 00:43:43.935442 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:43.935589 kubelet[1940]: I0513 00:43:43.935461 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:43.935589 kubelet[1940]: I0513 00:43:43.935476 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:43.935589 kubelet[1940]: I0513 00:43:43.935489 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:43.935589 kubelet[1940]: I0513 00:43:43.935503 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:43.935732 kubelet[1940]: I0513 00:43:43.935557 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ca1c56be84a73c5309bfb89d606e1676-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ca1c56be84a73c5309bfb89d606e1676\") " pod="kube-system/kube-apiserver-localhost" May 13 00:43:43.935732 kubelet[1940]: I0513 00:43:43.935621 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:43:44.080111 kubelet[1940]: E0513 00:43:44.080054 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 13 00:43:44.080326 kubelet[1940]: E0513 00:43:44.080303 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:44.080507 kubelet[1940]: E0513 00:43:44.080448 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:43:44.080779 kubelet[1940]: E0513 00:43:44.080744 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:44.082215 kubelet[1940]: I0513 00:43:44.082187 1940 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 13 00:43:44.082268 kubelet[1940]: I0513 00:43:44.082260 1940 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:43:44.254791 kubelet[1940]: E0513 00:43:44.254762 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:44.715659 kubelet[1940]: I0513 00:43:44.715610 1940 apiserver.go:52] "Watching apiserver" May 13 00:43:44.723376 kubelet[1940]: I0513 00:43:44.723333 1940 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:43:44.752882 kubelet[1940]: E0513 00:43:44.752847 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:44.753132 kubelet[1940]: E0513 00:43:44.752942 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:45.085464 kubelet[1940]: E0513 00:43:45.085413 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:43:45.085640 kubelet[1940]: E0513 00:43:45.085608 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:45.121620 kubelet[1940]: I0513 00:43:45.121530 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.121490115 podStartE2EDuration="2.121490115s" podCreationTimestamp="2025-05-13 00:43:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:45.025458912 +0000 UTC m=+1.365900617" watchObservedRunningTime="2025-05-13 00:43:45.121490115 +0000 UTC m=+1.461931820" May 13 00:43:45.143656 kubelet[1940]: I0513 00:43:45.143582 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.143558206 podStartE2EDuration="3.143558206s" podCreationTimestamp="2025-05-13 00:43:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:45.122189699 +0000 UTC m=+1.462631404" watchObservedRunningTime="2025-05-13 00:43:45.143558206 +0000 UTC m=+1.483999911" May 13 00:43:45.161444 kubelet[1940]: I0513 00:43:45.161366 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=3.161349992 podStartE2EDuration="3.161349992s" podCreationTimestamp="2025-05-13 00:43:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:45.144550934 +0000 UTC m=+1.484992639" watchObservedRunningTime="2025-05-13 00:43:45.161349992 +0000 UTC m=+1.501791697" May 13 00:43:45.754437 kubelet[1940]: E0513 00:43:45.754391 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:45.853751 kubelet[1940]: E0513 00:43:45.853700 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:46.224446 kubelet[1940]: E0513 00:43:46.224403 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:47.211000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:47.211000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bccac0 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:47.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b58920 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ac45a0 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:43:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bccb00 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:48.877264 sudo[1340]: pam_unix(sudo:session): session closed for user root May 13 00:43:48.876000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:48.878409 kernel: kauditd_printk_skb: 270 callbacks suppressed May 13 00:43:48.878465 kernel: audit: type=1106 audit(1747097028.876:807): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:48.882651 sshd[1337]: pam_unix(sshd:session): session closed for user core May 13 00:43:48.876000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:48.885098 systemd[1]: sshd@6-10.0.0.77:22-10.0.0.1:35518.service: Deactivated successfully. May 13 00:43:48.885761 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:43:48.885897 systemd[1]: session-7.scope: Consumed 4.609s CPU time. May 13 00:43:48.886395 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. May 13 00:43:48.887220 systemd-logind[1190]: Removed session 7. May 13 00:43:48.887765 kernel: audit: type=1104 audit(1747097028.876:808): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:43:48.887830 kernel: audit: type=1106 audit(1747097028.883:809): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:48.883000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:48.891996 kernel: audit: type=1104 audit(1747097028.883:810): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:48.883000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:43:48.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.77:22-10.0.0.1:35518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:48.899158 kernel: audit: type=1131 audit(1747097028.883:811): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.77:22-10.0.0.1:35518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:49.313000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520965 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:43:49.313000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f1d680 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:49.326049 kernel: audit: type=1400 audit(1747097029.313:812): avc: denied { watch } for pid=1801 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520965 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:43:49.326109 kernel: audit: type=1300 audit(1747097029.313:812): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f1d680 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:43:49.326131 kernel: audit: type=1327 audit(1747097029.313:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:49.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:43:49.644131 kubelet[1940]: I0513 00:43:49.644002 1940 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:43:49.644488 env[1200]: time="2025-05-13T00:43:49.644336029Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:43:49.644684 kubelet[1940]: I0513 00:43:49.644485 1940 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:43:50.385596 systemd[1]: Created slice kubepods-besteffort-pod8ccc3fa5_07f5_4e4c_8481_8843a9ce47b0.slice. May 13 00:43:50.479078 kubelet[1940]: I0513 00:43:50.479019 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0-lib-modules\") pod \"kube-proxy-z2dck\" (UID: \"8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0\") " pod="kube-system/kube-proxy-z2dck" May 13 00:43:50.479078 kubelet[1940]: I0513 00:43:50.479069 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0-kube-proxy\") pod \"kube-proxy-z2dck\" (UID: \"8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0\") " pod="kube-system/kube-proxy-z2dck" May 13 00:43:50.479296 kubelet[1940]: I0513 00:43:50.479094 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0-xtables-lock\") pod \"kube-proxy-z2dck\" (UID: \"8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0\") " pod="kube-system/kube-proxy-z2dck" May 13 00:43:50.479296 kubelet[1940]: I0513 00:43:50.479119 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2szg\" (UniqueName: \"kubernetes.io/projected/8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0-kube-api-access-w2szg\") pod \"kube-proxy-z2dck\" (UID: \"8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0\") " pod="kube-system/kube-proxy-z2dck" May 13 00:43:50.584541 kubelet[1940]: I0513 00:43:50.584505 1940 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:43:50.695252 kubelet[1940]: E0513 00:43:50.695118 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:50.695895 env[1200]: time="2025-05-13T00:43:50.695820179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z2dck,Uid:8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0,Namespace:kube-system,Attempt:0,}" May 13 00:43:50.711551 env[1200]: time="2025-05-13T00:43:50.711309374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:50.711551 env[1200]: time="2025-05-13T00:43:50.711350483Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:50.711551 env[1200]: time="2025-05-13T00:43:50.711373768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:50.711839 env[1200]: time="2025-05-13T00:43:50.711768582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485 pid=2034 runtime=io.containerd.runc.v2 May 13 00:43:50.728638 systemd[1]: run-containerd-runc-k8s.io-ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485-runc.8kdaoY.mount: Deactivated successfully. May 13 00:43:50.732816 systemd[1]: Started cri-containerd-ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485.scope. May 13 00:43:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747316 kernel: audit: type=1400 audit(1747097030.740:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747452 kernel: audit: type=1400 audit(1747097030.740:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.746000 audit: BPF prog-id=106 op=LOAD May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2034 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363938633163386566333233376266366430353531663734303161 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2034 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363938633163386566333233376266366430353531663734303161 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit: BPF prog-id=107 op=LOAD May 13 00:43:50.747000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1a30 items=0 ppid=2034 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363938633163386566333233376266366430353531663734303161 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit: BPF prog-id=108 op=LOAD May 13 00:43:50.747000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1a78 items=0 ppid=2034 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363938633163386566333233376266366430353531663734303161 May 13 00:43:50.747000 audit: BPF prog-id=108 op=UNLOAD May 13 00:43:50.747000 audit: BPF prog-id=107 op=UNLOAD May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.747000 audit: BPF prog-id=109 op=LOAD May 13 00:43:50.747000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1e88 items=0 ppid=2034 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363938633163386566333233376266366430353531663734303161 May 13 00:43:50.758335 env[1200]: time="2025-05-13T00:43:50.758293337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z2dck,Uid:8ccc3fa5-07f5-4e4c-8481-8843a9ce47b0,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485\"" May 13 00:43:50.759101 kubelet[1940]: E0513 00:43:50.759076 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:50.764023 env[1200]: time="2025-05-13T00:43:50.763988799Z" level=info msg="CreateContainer within sandbox \"ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:43:50.779464 env[1200]: time="2025-05-13T00:43:50.779414343Z" level=info msg="CreateContainer within sandbox \"ad698c1c8ef3237bf6d0551f7401a7902739aa80dc8e5572c2eab7fa8eee0485\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"be2b42002ee9141a77f498ec0735a4950cf8f807f0155e8bedac8829e7dc0984\"" May 13 00:43:50.779868 env[1200]: time="2025-05-13T00:43:50.779823073Z" level=info msg="StartContainer for \"be2b42002ee9141a77f498ec0735a4950cf8f807f0155e8bedac8829e7dc0984\"" May 13 00:43:50.794137 systemd[1]: Started cri-containerd-be2b42002ee9141a77f498ec0735a4950cf8f807f0155e8bedac8829e7dc0984.scope. May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f64402b90a8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326234323030326565393134316137376634393865633037333561 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit: BPF prog-id=110 op=LOAD May 13 00:43:50.807000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8aa8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326234323030326565393134316137376634393865633037333561 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit: BPF prog-id=111 op=LOAD May 13 00:43:50.807000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8af8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326234323030326565393134316137376634393865633037333561 May 13 00:43:50.807000 audit: BPF prog-id=111 op=UNLOAD May 13 00:43:50.807000 audit: BPF prog-id=110 op=UNLOAD May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:50.807000 audit: BPF prog-id=112 op=LOAD May 13 00:43:50.807000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8b88 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326234323030326565393134316137376634393865633037333561 May 13 00:43:50.827705 env[1200]: time="2025-05-13T00:43:50.826104585Z" level=info msg="StartContainer for \"be2b42002ee9141a77f498ec0735a4950cf8f807f0155e8bedac8829e7dc0984\" returns successfully" May 13 00:43:50.850876 systemd[1]: Created slice kubepods-besteffort-pod4aa450db_0e36_4863_913e_3612da3a62e0.slice. May 13 00:43:50.882913 kubelet[1940]: I0513 00:43:50.882872 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4aa450db-0e36-4863-913e-3612da3a62e0-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-txltb\" (UID: \"4aa450db-0e36-4863-913e-3612da3a62e0\") " pod="tigera-operator/tigera-operator-6f6897fdc5-txltb" May 13 00:43:50.882913 kubelet[1940]: I0513 00:43:50.882915 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hpv8q\" (UniqueName: \"kubernetes.io/projected/4aa450db-0e36-4863-913e-3612da3a62e0-kube-api-access-hpv8q\") pod \"tigera-operator-6f6897fdc5-txltb\" (UID: \"4aa450db-0e36-4863-913e-3612da3a62e0\") " pod="tigera-operator/tigera-operator-6f6897fdc5-txltb" May 13 00:43:50.935000 audit[2136]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:50.935000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffece19bd00 a2=0 a3=7ffece19bcec items=0 ppid=2086 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:43:50.935000 audit[2137]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:50.935000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6d057960 a2=0 a3=7ffe6d05794c items=0 ppid=2086 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:43:50.936000 audit[2138]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:50.936000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe720f9480 a2=0 a3=7ffe720f946c items=0 ppid=2086 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:43:50.937000 audit[2139]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:50.937000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb81d8b90 a2=0 a3=7fffb81d8b7c items=0 ppid=2086 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.937000 audit[2140]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:50.937000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1c3b3f00 a2=0 a3=7ffe1c3b3eec items=0 ppid=2086 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:43:50.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:43:50.939000 audit[2141]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:50.939000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6ea5b1d0 a2=0 a3=7ffd6ea5b1bc items=0 ppid=2086 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:50.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:43:51.037000 audit[2143]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.037000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdf6df2e20 a2=0 a3=7ffdf6df2e0c items=0 ppid=2086 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:43:51.040000 audit[2145]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.040000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff81b92d80 a2=0 a3=7fff81b92d6c items=0 ppid=2086 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:43:51.043000 audit[2148]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.043000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc33362710 a2=0 a3=7ffc333626fc items=0 ppid=2086 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:43:51.044000 audit[2149]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.044000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe647c3b0 a2=0 a3=7fffe647c39c items=0 ppid=2086 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:43:51.046000 audit[2151]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.046000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfa7dd0a0 a2=0 a3=7ffdfa7dd08c items=0 ppid=2086 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:43:51.047000 audit[2152]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.047000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf628af20 a2=0 a3=7ffcf628af0c items=0 ppid=2086 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:43:51.049000 audit[2154]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.049000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff444d9240 a2=0 a3=7fff444d922c items=0 ppid=2086 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:43:51.052000 audit[2157]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.052000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5fa96c20 a2=0 a3=7ffc5fa96c0c items=0 ppid=2086 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:43:51.053000 audit[2158]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.053000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd27f133c0 a2=0 a3=7ffd27f133ac items=0 ppid=2086 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:43:51.055000 audit[2160]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.055000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9b1264b0 a2=0 a3=7fff9b12649c items=0 ppid=2086 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:43:51.056000 audit[2161]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.056000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff78ffe700 a2=0 a3=7fff78ffe6ec items=0 ppid=2086 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:43:51.058000 audit[2163]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.058000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfa622080 a2=0 a3=7ffcfa62206c items=0 ppid=2086 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:43:51.061000 audit[2166]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.061000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6110fe60 a2=0 a3=7ffc6110fe4c items=0 ppid=2086 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:43:51.064000 audit[2169]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.064000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd56d61e10 a2=0 a3=7ffd56d61dfc items=0 ppid=2086 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:43:51.065000 audit[2170]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.065000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf0ee3af0 a2=0 a3=7ffcf0ee3adc items=0 ppid=2086 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:43:51.067000 audit[2172]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.067000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffbbbae590 a2=0 a3=7fffbbbae57c items=0 ppid=2086 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:43:51.070000 audit[2175]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.070000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe29f44e10 a2=0 a3=7ffe29f44dfc items=0 ppid=2086 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:43:51.071000 audit[2176]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.071000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaa8c2d10 a2=0 a3=7fffaa8c2cfc items=0 ppid=2086 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:43:51.073000 audit[2178]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:43:51.073000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd816d5d30 a2=0 a3=7ffd816d5d1c items=0 ppid=2086 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:43:51.094000 audit[2184]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:51.094000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd6192f990 a2=0 a3=7ffd6192f97c items=0 ppid=2086 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:51.102000 audit[2184]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:51.102000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd6192f990 a2=0 a3=7ffd6192f97c items=0 ppid=2086 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:51.103000 audit[2189]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.103000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe19b0b610 a2=0 a3=7ffe19b0b5fc items=0 ppid=2086 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:43:51.105000 audit[2191]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.105000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc877ac6c0 a2=0 a3=7ffc877ac6ac items=0 ppid=2086 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:43:51.108000 audit[2194]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.108000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe183bf840 a2=0 a3=7ffe183bf82c items=0 ppid=2086 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:43:51.109000 audit[2195]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.109000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5b4ae450 a2=0 a3=7ffe5b4ae43c items=0 ppid=2086 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:43:51.111000 audit[2197]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.111000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd024be5b0 a2=0 a3=7ffd024be59c items=0 ppid=2086 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:43:51.112000 audit[2198]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.112000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf12c66f0 a2=0 a3=7ffcf12c66dc items=0 ppid=2086 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:43:51.114000 audit[2200]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.114000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc13401f0 a2=0 a3=7ffcc13401dc items=0 ppid=2086 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:43:51.117000 audit[2203]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.117000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde8d157a0 a2=0 a3=7ffde8d1578c items=0 ppid=2086 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:43:51.118000 audit[2204]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.118000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda8da180 a2=0 a3=7ffcda8da16c items=0 ppid=2086 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:43:51.120000 audit[2206]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.120000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc91b56e60 a2=0 a3=7ffc91b56e4c items=0 ppid=2086 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:43:51.121000 audit[2207]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.121000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2348aa60 a2=0 a3=7ffe2348aa4c items=0 ppid=2086 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:43:51.123000 audit[2209]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.123000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2e606530 a2=0 a3=7ffd2e60651c items=0 ppid=2086 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:43:51.127000 audit[2212]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.127000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff36fda680 a2=0 a3=7fff36fda66c items=0 ppid=2086 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:43:51.130000 audit[2215]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.130000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb2fdf0f0 a2=0 a3=7ffdb2fdf0dc items=0 ppid=2086 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:43:51.132000 audit[2216]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.132000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffe807680 a2=0 a3=7ffffe80766c items=0 ppid=2086 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:43:51.135000 audit[2218]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.135000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc4659fcc0 a2=0 a3=7ffc4659fcac items=0 ppid=2086 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:43:51.138000 audit[2221]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.138000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff984a80f0 a2=0 a3=7fff984a80dc items=0 ppid=2086 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:43:51.139000 audit[2222]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.139000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedde7f670 a2=0 a3=7ffedde7f65c items=0 ppid=2086 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:43:51.140000 audit[2224]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.140000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7b1f7d30 a2=0 a3=7ffe7b1f7d1c items=0 ppid=2086 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:43:51.141000 audit[2225]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.141000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe70e53a90 a2=0 a3=7ffe70e53a7c items=0 ppid=2086 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:43:51.144000 audit[2227]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.144000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff60c61790 a2=0 a3=7fff60c6177c items=0 ppid=2086 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:43:51.147000 audit[2230]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:43:51.147000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffcd02c60 a2=0 a3=7ffffcd02c4c items=0 ppid=2086 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:43:51.150000 audit[2232]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:43:51.150000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd6458ecb0 a2=0 a3=7ffd6458ec9c items=0 ppid=2086 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.150000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:51.150000 audit[2232]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:43:51.150000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd6458ecb0 a2=0 a3=7ffd6458ec9c items=0 ppid=2086 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.150000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:51.154496 env[1200]: time="2025-05-13T00:43:51.154456381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-txltb,Uid:4aa450db-0e36-4863-913e-3612da3a62e0,Namespace:tigera-operator,Attempt:0,}" May 13 00:43:51.181006 env[1200]: time="2025-05-13T00:43:51.180907316Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:51.181006 env[1200]: time="2025-05-13T00:43:51.180956761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:51.181006 env[1200]: time="2025-05-13T00:43:51.180968223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:51.181525 env[1200]: time="2025-05-13T00:43:51.181407721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35d4946306a7d7b4929ad1921de0ba38ae65099967cb698273e2a69bea322df9 pid=2241 runtime=io.containerd.runc.v2 May 13 00:43:51.193711 systemd[1]: Started cri-containerd-35d4946306a7d7b4929ad1921de0ba38ae65099967cb698273e2a69bea322df9.scope. May 13 00:43:51.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit: BPF prog-id=113 op=LOAD May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2241 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643439343633303661376437623439323961643139323164653062 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2241 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643439343633303661376437623439323961643139323164653062 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.205000 audit: BPF prog-id=114 op=LOAD May 13 00:43:51.205000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=2241 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643439343633303661376437623439323961643139323164653062 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit: BPF prog-id=115 op=LOAD May 13 00:43:51.206000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=2241 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643439343633303661376437623439323961643139323164653062 May 13 00:43:51.206000 audit: BPF prog-id=115 op=UNLOAD May 13 00:43:51.206000 audit: BPF prog-id=114 op=UNLOAD May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:51.206000 audit: BPF prog-id=116 op=LOAD May 13 00:43:51.206000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003da138 items=0 ppid=2241 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:51.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643439343633303661376437623439323961643139323164653062 May 13 00:43:51.230565 env[1200]: time="2025-05-13T00:43:51.230511748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-txltb,Uid:4aa450db-0e36-4863-913e-3612da3a62e0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"35d4946306a7d7b4929ad1921de0ba38ae65099967cb698273e2a69bea322df9\"" May 13 00:43:51.232710 env[1200]: time="2025-05-13T00:43:51.232645037Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:43:51.768690 kubelet[1940]: E0513 00:43:51.768633 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:51.777866 kubelet[1940]: I0513 00:43:51.777793 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-z2dck" podStartSLOduration=1.7777703310000001 podStartE2EDuration="1.777770331s" podCreationTimestamp="2025-05-13 00:43:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:43:51.77747588 +0000 UTC m=+8.117917615" watchObservedRunningTime="2025-05-13 00:43:51.777770331 +0000 UTC m=+8.118212036" May 13 00:43:51.844619 kubelet[1940]: E0513 00:43:51.844563 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:52.766738 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1298103246.mount: Deactivated successfully. May 13 00:43:52.776004 kubelet[1940]: E0513 00:43:52.775776 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:52.776004 kubelet[1940]: E0513 00:43:52.775978 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:53.138817 update_engine[1191]: I0513 00:43:53.138767 1191 update_attempter.cc:509] Updating boot flags... May 13 00:43:53.624300 env[1200]: time="2025-05-13T00:43:53.624219628Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:53.626293 env[1200]: time="2025-05-13T00:43:53.626249390Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:53.628146 env[1200]: time="2025-05-13T00:43:53.628094541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:53.629856 env[1200]: time="2025-05-13T00:43:53.629804395Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:53.630231 env[1200]: time="2025-05-13T00:43:53.630191091Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 00:43:53.632515 env[1200]: time="2025-05-13T00:43:53.632474536Z" level=info msg="CreateContainer within sandbox \"35d4946306a7d7b4929ad1921de0ba38ae65099967cb698273e2a69bea322df9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:43:53.643130 env[1200]: time="2025-05-13T00:43:53.643090217Z" level=info msg="CreateContainer within sandbox \"35d4946306a7d7b4929ad1921de0ba38ae65099967cb698273e2a69bea322df9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a9d7876dfd653ade88c9aa660d64ae68907705c18e2b5152ab8382b261bc366e\"" May 13 00:43:53.643567 env[1200]: time="2025-05-13T00:43:53.643541155Z" level=info msg="StartContainer for \"a9d7876dfd653ade88c9aa660d64ae68907705c18e2b5152ab8382b261bc366e\"" May 13 00:43:53.662110 systemd[1]: Started cri-containerd-a9d7876dfd653ade88c9aa660d64ae68907705c18e2b5152ab8382b261bc366e.scope. May 13 00:43:53.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.673000 audit: BPF prog-id=117 op=LOAD May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2241 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:53.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139643738373664666436353361646538386339616136363064363461 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2241 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:53.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139643738373664666436353361646538386339616136363064363461 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit: BPF prog-id=118 op=LOAD May 13 00:43:53.674000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020d8b0 items=0 ppid=2241 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:53.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139643738373664666436353361646538386339616136363064363461 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit: BPF prog-id=119 op=LOAD May 13 00:43:53.674000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020d8f8 items=0 ppid=2241 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:53.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139643738373664666436353361646538386339616136363064363461 May 13 00:43:53.674000 audit: BPF prog-id=119 op=UNLOAD May 13 00:43:53.674000 audit: BPF prog-id=118 op=UNLOAD May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:53.674000 audit: BPF prog-id=120 op=LOAD May 13 00:43:53.674000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020dd08 items=0 ppid=2241 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:53.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139643738373664666436353361646538386339616136363064363461 May 13 00:43:53.689795 env[1200]: time="2025-05-13T00:43:53.689746262Z" level=info msg="StartContainer for \"a9d7876dfd653ade88c9aa660d64ae68907705c18e2b5152ab8382b261bc366e\" returns successfully" May 13 00:43:55.857286 kubelet[1940]: E0513 00:43:55.857250 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:55.864446 kubelet[1940]: I0513 00:43:55.864385 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-txltb" podStartSLOduration=3.465144898 podStartE2EDuration="5.864365482s" podCreationTimestamp="2025-05-13 00:43:50 +0000 UTC" firstStartedPulling="2025-05-13 00:43:51.231968336 +0000 UTC m=+7.572410041" lastFinishedPulling="2025-05-13 00:43:53.63118892 +0000 UTC m=+9.971630625" observedRunningTime="2025-05-13 00:43:53.786255678 +0000 UTC m=+10.126697383" watchObservedRunningTime="2025-05-13 00:43:55.864365482 +0000 UTC m=+12.204807207" May 13 00:43:56.227967 kubelet[1940]: E0513 00:43:56.227839 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:56.351000 audit[2330]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.353036 kernel: kauditd_printk_skb: 365 callbacks suppressed May 13 00:43:56.353082 kernel: audit: type=1325 audit(1747097036.351:924): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.351000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec3969190 a2=0 a3=7ffec396917c items=0 ppid=2086 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.359840 kernel: audit: type=1300 audit(1747097036.351:924): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec3969190 a2=0 a3=7ffec396917c items=0 ppid=2086 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.359877 kernel: audit: type=1327 audit(1747097036.351:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.363000 audit[2330]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.363000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffec3969190 a2=0 a3=0 items=0 ppid=2086 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.370888 kernel: audit: type=1325 audit(1747097036.363:925): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.370923 kernel: audit: type=1300 audit(1747097036.363:925): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffec3969190 a2=0 a3=0 items=0 ppid=2086 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.370943 kernel: audit: type=1327 audit(1747097036.363:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.377000 audit[2332]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.377000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe98db4650 a2=0 a3=7ffe98db463c items=0 ppid=2086 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.385553 kernel: audit: type=1325 audit(1747097036.377:926): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.385624 kernel: audit: type=1300 audit(1747097036.377:926): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe98db4650 a2=0 a3=7ffe98db463c items=0 ppid=2086 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.388705 kernel: audit: type=1327 audit(1747097036.377:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.388000 audit[2332]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.388000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe98db4650 a2=0 a3=0 items=0 ppid=2086 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:56.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:56.391683 kernel: audit: type=1325 audit(1747097036.388:927): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:56.570309 systemd[1]: Created slice kubepods-besteffort-pod59723613_e5dc_4d94_ad0c_c5a7ffe828f4.slice. May 13 00:43:56.577831 systemd[1]: Created slice kubepods-besteffort-poda89a7e75_2237_4ea6_a13d_cc103c9079eb.slice. May 13 00:43:56.624305 kubelet[1940]: I0513 00:43:56.624249 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/59723613-e5dc-4d94-ad0c-c5a7ffe828f4-typha-certs\") pod \"calico-typha-7675dddc4f-vwnc5\" (UID: \"59723613-e5dc-4d94-ad0c-c5a7ffe828f4\") " pod="calico-system/calico-typha-7675dddc4f-vwnc5" May 13 00:43:56.624305 kubelet[1940]: I0513 00:43:56.624286 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w4cmh\" (UniqueName: \"kubernetes.io/projected/a89a7e75-2237-4ea6-a13d-cc103c9079eb-kube-api-access-w4cmh\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624305 kubelet[1940]: I0513 00:43:56.624305 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-lib-modules\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624586 kubelet[1940]: I0513 00:43:56.624326 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-policysync\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624586 kubelet[1940]: I0513 00:43:56.624339 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-flexvol-driver-host\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624586 kubelet[1940]: I0513 00:43:56.624365 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a89a7e75-2237-4ea6-a13d-cc103c9079eb-node-certs\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624586 kubelet[1940]: I0513 00:43:56.624379 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/59723613-e5dc-4d94-ad0c-c5a7ffe828f4-tigera-ca-bundle\") pod \"calico-typha-7675dddc4f-vwnc5\" (UID: \"59723613-e5dc-4d94-ad0c-c5a7ffe828f4\") " pod="calico-system/calico-typha-7675dddc4f-vwnc5" May 13 00:43:56.624586 kubelet[1940]: I0513 00:43:56.624392 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-cni-net-dir\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624726 kubelet[1940]: I0513 00:43:56.624412 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a89a7e75-2237-4ea6-a13d-cc103c9079eb-tigera-ca-bundle\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624726 kubelet[1940]: I0513 00:43:56.624433 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-cni-bin-dir\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624726 kubelet[1940]: I0513 00:43:56.624462 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4c75l\" (UniqueName: \"kubernetes.io/projected/59723613-e5dc-4d94-ad0c-c5a7ffe828f4-kube-api-access-4c75l\") pod \"calico-typha-7675dddc4f-vwnc5\" (UID: \"59723613-e5dc-4d94-ad0c-c5a7ffe828f4\") " pod="calico-system/calico-typha-7675dddc4f-vwnc5" May 13 00:43:56.624726 kubelet[1940]: I0513 00:43:56.624477 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-var-run-calico\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624726 kubelet[1940]: I0513 00:43:56.624490 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-var-lib-calico\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624870 kubelet[1940]: I0513 00:43:56.624504 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-xtables-lock\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.624870 kubelet[1940]: I0513 00:43:56.624516 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a89a7e75-2237-4ea6-a13d-cc103c9079eb-cni-log-dir\") pod \"calico-node-6vmh6\" (UID: \"a89a7e75-2237-4ea6-a13d-cc103c9079eb\") " pod="calico-system/calico-node-6vmh6" May 13 00:43:56.664855 kubelet[1940]: E0513 00:43:56.664794 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:43:56.725096 kubelet[1940]: I0513 00:43:56.725042 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/94dec563-a208-445d-befe-67b1bf96f70e-varrun\") pod \"csi-node-driver-7z6bj\" (UID: \"94dec563-a208-445d-befe-67b1bf96f70e\") " pod="calico-system/csi-node-driver-7z6bj" May 13 00:43:56.725096 kubelet[1940]: I0513 00:43:56.725107 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/94dec563-a208-445d-befe-67b1bf96f70e-kubelet-dir\") pod \"csi-node-driver-7z6bj\" (UID: \"94dec563-a208-445d-befe-67b1bf96f70e\") " pod="calico-system/csi-node-driver-7z6bj" May 13 00:43:56.725381 kubelet[1940]: I0513 00:43:56.725130 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/94dec563-a208-445d-befe-67b1bf96f70e-registration-dir\") pod \"csi-node-driver-7z6bj\" (UID: \"94dec563-a208-445d-befe-67b1bf96f70e\") " pod="calico-system/csi-node-driver-7z6bj" May 13 00:43:56.725381 kubelet[1940]: I0513 00:43:56.725184 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gpcjk\" (UniqueName: \"kubernetes.io/projected/94dec563-a208-445d-befe-67b1bf96f70e-kube-api-access-gpcjk\") pod \"csi-node-driver-7z6bj\" (UID: \"94dec563-a208-445d-befe-67b1bf96f70e\") " pod="calico-system/csi-node-driver-7z6bj" May 13 00:43:56.725381 kubelet[1940]: I0513 00:43:56.725246 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/94dec563-a208-445d-befe-67b1bf96f70e-socket-dir\") pod \"csi-node-driver-7z6bj\" (UID: \"94dec563-a208-445d-befe-67b1bf96f70e\") " pod="calico-system/csi-node-driver-7z6bj" May 13 00:43:56.726949 kubelet[1940]: E0513 00:43:56.726915 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.726949 kubelet[1940]: W0513 00:43:56.726940 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.727060 kubelet[1940]: E0513 00:43:56.726965 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.727871 kubelet[1940]: E0513 00:43:56.727827 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.727932 kubelet[1940]: W0513 00:43:56.727899 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.728021 kubelet[1940]: E0513 00:43:56.727949 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.728747 kubelet[1940]: E0513 00:43:56.728682 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.728747 kubelet[1940]: W0513 00:43:56.728696 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.728747 kubelet[1940]: E0513 00:43:56.728736 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729419 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.731949 kubelet[1940]: W0513 00:43:56.729429 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729470 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729579 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.731949 kubelet[1940]: W0513 00:43:56.729586 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729658 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729853 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.731949 kubelet[1940]: W0513 00:43:56.729861 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.729872 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.731949 kubelet[1940]: E0513 00:43:56.730158 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.732194 kubelet[1940]: W0513 00:43:56.730166 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730175 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730304 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.732194 kubelet[1940]: W0513 00:43:56.730310 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730317 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730434 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.732194 kubelet[1940]: W0513 00:43:56.730441 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730448 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.732194 kubelet[1940]: E0513 00:43:56.730571 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.732194 kubelet[1940]: W0513 00:43:56.730579 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.732442 kubelet[1940]: E0513 00:43:56.730586 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.733041 kubelet[1940]: E0513 00:43:56.733013 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.733041 kubelet[1940]: W0513 00:43:56.733032 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.733041 kubelet[1940]: E0513 00:43:56.733043 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.734136 kubelet[1940]: E0513 00:43:56.734111 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.734136 kubelet[1940]: W0513 00:43:56.734131 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.734222 kubelet[1940]: E0513 00:43:56.734141 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.741102 kubelet[1940]: E0513 00:43:56.741068 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.741102 kubelet[1940]: W0513 00:43:56.741091 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.741252 kubelet[1940]: E0513 00:43:56.741116 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.741391 kubelet[1940]: E0513 00:43:56.741329 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.741391 kubelet[1940]: W0513 00:43:56.741352 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.741391 kubelet[1940]: E0513 00:43:56.741361 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826106 kubelet[1940]: E0513 00:43:56.825982 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826106 kubelet[1940]: W0513 00:43:56.826004 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826106 kubelet[1940]: E0513 00:43:56.826025 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826325 kubelet[1940]: E0513 00:43:56.826177 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826325 kubelet[1940]: W0513 00:43:56.826185 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826325 kubelet[1940]: E0513 00:43:56.826196 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826443 kubelet[1940]: E0513 00:43:56.826371 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826443 kubelet[1940]: W0513 00:43:56.826381 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826443 kubelet[1940]: E0513 00:43:56.826391 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826568 kubelet[1940]: E0513 00:43:56.826546 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826568 kubelet[1940]: W0513 00:43:56.826556 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826568 kubelet[1940]: E0513 00:43:56.826565 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826746 kubelet[1940]: E0513 00:43:56.826723 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826746 kubelet[1940]: W0513 00:43:56.826736 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826746 kubelet[1940]: E0513 00:43:56.826749 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.826978 kubelet[1940]: E0513 00:43:56.826922 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.826978 kubelet[1940]: W0513 00:43:56.826930 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.826978 kubelet[1940]: E0513 00:43:56.826946 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.827093 kubelet[1940]: E0513 00:43:56.827068 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.827093 kubelet[1940]: W0513 00:43:56.827090 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.827206 kubelet[1940]: E0513 00:43:56.827102 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.827415 kubelet[1940]: E0513 00:43:56.827394 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.827415 kubelet[1940]: W0513 00:43:56.827406 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.827505 kubelet[1940]: E0513 00:43:56.827421 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.827642 kubelet[1940]: E0513 00:43:56.827631 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.827642 kubelet[1940]: W0513 00:43:56.827639 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.827737 kubelet[1940]: E0513 00:43:56.827714 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.827820 kubelet[1940]: E0513 00:43:56.827807 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.827820 kubelet[1940]: W0513 00:43:56.827818 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.827964 kubelet[1940]: E0513 00:43:56.827849 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.828018 kubelet[1940]: E0513 00:43:56.827992 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.828018 kubelet[1940]: W0513 00:43:56.828005 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.828196 kubelet[1940]: E0513 00:43:56.828048 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.828196 kubelet[1940]: E0513 00:43:56.828165 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.828196 kubelet[1940]: W0513 00:43:56.828172 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.828277 kubelet[1940]: E0513 00:43:56.828222 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.828390 kubelet[1940]: E0513 00:43:56.828368 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.828423 kubelet[1940]: W0513 00:43:56.828390 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.828455 kubelet[1940]: E0513 00:43:56.828441 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.828625 kubelet[1940]: E0513 00:43:56.828609 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.828625 kubelet[1940]: W0513 00:43:56.828620 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.828730 kubelet[1940]: E0513 00:43:56.828635 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.828820 kubelet[1940]: E0513 00:43:56.828807 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.828820 kubelet[1940]: W0513 00:43:56.828818 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.828868 kubelet[1940]: E0513 00:43:56.828834 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829065 kubelet[1940]: E0513 00:43:56.829042 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829065 kubelet[1940]: W0513 00:43:56.829057 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829132 kubelet[1940]: E0513 00:43:56.829073 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829299 kubelet[1940]: E0513 00:43:56.829238 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829299 kubelet[1940]: W0513 00:43:56.829248 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829299 kubelet[1940]: E0513 00:43:56.829265 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829465 kubelet[1940]: E0513 00:43:56.829449 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829465 kubelet[1940]: W0513 00:43:56.829462 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829523 kubelet[1940]: E0513 00:43:56.829487 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829605 kubelet[1940]: E0513 00:43:56.829592 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829605 kubelet[1940]: W0513 00:43:56.829602 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829651 kubelet[1940]: E0513 00:43:56.829635 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829767 kubelet[1940]: E0513 00:43:56.829754 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829767 kubelet[1940]: W0513 00:43:56.829763 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829820 kubelet[1940]: E0513 00:43:56.829783 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.829905 kubelet[1940]: E0513 00:43:56.829892 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.829905 kubelet[1940]: W0513 00:43:56.829903 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.829955 kubelet[1940]: E0513 00:43:56.829914 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.830150 kubelet[1940]: E0513 00:43:56.830135 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.830150 kubelet[1940]: W0513 00:43:56.830147 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.830228 kubelet[1940]: E0513 00:43:56.830159 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.830436 kubelet[1940]: E0513 00:43:56.830419 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.830436 kubelet[1940]: W0513 00:43:56.830431 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.830510 kubelet[1940]: E0513 00:43:56.830446 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.830636 kubelet[1940]: E0513 00:43:56.830605 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.830636 kubelet[1940]: W0513 00:43:56.830629 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.830755 kubelet[1940]: E0513 00:43:56.830641 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.830875 kubelet[1940]: E0513 00:43:56.830863 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.830900 kubelet[1940]: W0513 00:43:56.830874 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.830900 kubelet[1940]: E0513 00:43:56.830883 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.837216 kubelet[1940]: E0513 00:43:56.837180 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:43:56.837216 kubelet[1940]: W0513 00:43:56.837194 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:43:56.837216 kubelet[1940]: E0513 00:43:56.837206 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:43:56.875499 kubelet[1940]: E0513 00:43:56.875457 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:56.876045 env[1200]: time="2025-05-13T00:43:56.876001815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7675dddc4f-vwnc5,Uid:59723613-e5dc-4d94-ad0c-c5a7ffe828f4,Namespace:calico-system,Attempt:0,}" May 13 00:43:56.880962 kubelet[1940]: E0513 00:43:56.880928 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:56.881419 env[1200]: time="2025-05-13T00:43:56.881379553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vmh6,Uid:a89a7e75-2237-4ea6-a13d-cc103c9079eb,Namespace:calico-system,Attempt:0,}" May 13 00:43:56.998361 env[1200]: time="2025-05-13T00:43:56.998275381Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:56.998545 env[1200]: time="2025-05-13T00:43:56.998365031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:56.998545 env[1200]: time="2025-05-13T00:43:56.998377324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:56.998764 env[1200]: time="2025-05-13T00:43:56.998711850Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c11d200665f25bbef7c2c9075a4ee6fb72c660cffc1e3c395edcae98ee925b9 pid=2392 runtime=io.containerd.runc.v2 May 13 00:43:56.999262 env[1200]: time="2025-05-13T00:43:56.999082403Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:43:57.000087 env[1200]: time="2025-05-13T00:43:56.999426266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:43:57.000087 env[1200]: time="2025-05-13T00:43:56.999440473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:43:57.000087 env[1200]: time="2025-05-13T00:43:56.999739430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c pid=2394 runtime=io.containerd.runc.v2 May 13 00:43:57.011989 systemd[1]: Started cri-containerd-8c11d200665f25bbef7c2c9075a4ee6fb72c660cffc1e3c395edcae98ee925b9.scope. May 13 00:43:57.021844 systemd[1]: Started cri-containerd-747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c.scope. May 13 00:43:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit: BPF prog-id=121 op=LOAD May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2392 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313164323030363635663235626265663763326339303735613465 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2392 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313164323030363635663235626265663763326339303735613465 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit: BPF prog-id=122 op=LOAD May 13 00:43:57.029000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00028bc10 items=0 ppid=2392 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313164323030363635663235626265663763326339303735613465 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit: BPF prog-id=123 op=LOAD May 13 00:43:57.029000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00028bc58 items=0 ppid=2392 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313164323030363635663235626265663763326339303735613465 May 13 00:43:57.029000 audit: BPF prog-id=123 op=UNLOAD May 13 00:43:57.029000 audit: BPF prog-id=122 op=UNLOAD May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.029000 audit: BPF prog-id=124 op=LOAD May 13 00:43:57.029000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002fa068 items=0 ppid=2392 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313164323030363635663235626265663763326339303735613465 May 13 00:43:57.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit: BPF prog-id=125 op=LOAD May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2394 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376534333932666138353265343065636333303230393431616431 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2394 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376534333932666138353265343065636333303230393431616431 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit: BPF prog-id=126 op=LOAD May 13 00:43:57.032000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002c1ce0 items=0 ppid=2394 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376534333932666138353265343065636333303230393431616431 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit: BPF prog-id=127 op=LOAD May 13 00:43:57.032000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002c1d28 items=0 ppid=2394 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376534333932666138353265343065636333303230393431616431 May 13 00:43:57.032000 audit: BPF prog-id=127 op=UNLOAD May 13 00:43:57.032000 audit: BPF prog-id=126 op=UNLOAD May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:57.032000 audit: BPF prog-id=128 op=LOAD May 13 00:43:57.032000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00032c138 items=0 ppid=2394 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376534333932666138353265343065636333303230393431616431 May 13 00:43:57.044369 env[1200]: time="2025-05-13T00:43:57.044306234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vmh6,Uid:a89a7e75-2237-4ea6-a13d-cc103c9079eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\"" May 13 00:43:57.046086 kubelet[1940]: E0513 00:43:57.045823 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:57.048016 env[1200]: time="2025-05-13T00:43:57.047759084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:43:57.061054 env[1200]: time="2025-05-13T00:43:57.061000340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7675dddc4f-vwnc5,Uid:59723613-e5dc-4d94-ad0c-c5a7ffe828f4,Namespace:calico-system,Attempt:0,} returns sandbox id \"8c11d200665f25bbef7c2c9075a4ee6fb72c660cffc1e3c395edcae98ee925b9\"" May 13 00:43:57.062294 kubelet[1940]: E0513 00:43:57.062266 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:57.399000 audit[2461]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:57.399000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffd6251550 a2=0 a3=7fffd625153c items=0 ppid=2086 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:57.405000 audit[2461]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:43:57.405000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd6251550 a2=0 a3=0 items=0 ppid=2086 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:57.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:43:58.703226 env[1200]: time="2025-05-13T00:43:58.703166017Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:58.706114 env[1200]: time="2025-05-13T00:43:58.706049342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:58.708061 env[1200]: time="2025-05-13T00:43:58.708033753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:58.709559 env[1200]: time="2025-05-13T00:43:58.709503309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:43:58.709993 env[1200]: time="2025-05-13T00:43:58.709948883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:43:58.711395 env[1200]: time="2025-05-13T00:43:58.711215404Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:43:58.712530 env[1200]: time="2025-05-13T00:43:58.712485141Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:43:58.728494 env[1200]: time="2025-05-13T00:43:58.728447407Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89\"" May 13 00:43:58.729597 env[1200]: time="2025-05-13T00:43:58.729037515Z" level=info msg="StartContainer for \"173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89\"" May 13 00:43:58.738379 kubelet[1940]: E0513 00:43:58.738309 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:43:58.748229 systemd[1]: run-containerd-runc-k8s.io-173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89-runc.x8vb5i.mount: Deactivated successfully. May 13 00:43:58.752553 systemd[1]: Started cri-containerd-173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89.scope. May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f247274d1a8 items=0 ppid=2394 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333839343232336330376436666363633565303436613263343462 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.763000 audit: BPF prog-id=129 op=LOAD May 13 00:43:58.763000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000386618 items=0 ppid=2394 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333839343232336330376436666363633565303436613263343462 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit: BPF prog-id=130 op=LOAD May 13 00:43:58.764000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000386668 items=0 ppid=2394 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333839343232336330376436666363633565303436613263343462 May 13 00:43:58.764000 audit: BPF prog-id=130 op=UNLOAD May 13 00:43:58.764000 audit: BPF prog-id=129 op=UNLOAD May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:43:58.764000 audit: BPF prog-id=131 op=LOAD May 13 00:43:58.764000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003866f8 items=0 ppid=2394 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333839343232336330376436666363633565303436613263343462 May 13 00:43:58.778625 env[1200]: time="2025-05-13T00:43:58.778583006Z" level=info msg="StartContainer for \"173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89\" returns successfully" May 13 00:43:58.786977 systemd[1]: cri-containerd-173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89.scope: Deactivated successfully. May 13 00:43:58.790173 kubelet[1940]: E0513 00:43:58.790126 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:43:58.792000 audit: BPF prog-id=131 op=UNLOAD May 13 00:43:58.815436 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89-rootfs.mount: Deactivated successfully. May 13 00:43:58.884874 env[1200]: time="2025-05-13T00:43:58.884817819Z" level=info msg="shim disconnected" id=173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89 May 13 00:43:58.884874 env[1200]: time="2025-05-13T00:43:58.884865630Z" level=warning msg="cleaning up after shim disconnected" id=173894223c07d6fccc5e046a2c44b24b5cae7e188427bc9ce4bcf285a9943d89 namespace=k8s.io May 13 00:43:58.884874 env[1200]: time="2025-05-13T00:43:58.884875478Z" level=info msg="cleaning up dead shim" May 13 00:43:58.892161 env[1200]: time="2025-05-13T00:43:58.892116184Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:43:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2514 runtime=io.containerd.runc.v2\n" May 13 00:43:59.792592 kubelet[1940]: E0513 00:43:59.792549 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:00.739020 kubelet[1940]: E0513 00:44:00.738949 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:02.443837 env[1200]: time="2025-05-13T00:44:02.443773930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:02.445964 env[1200]: time="2025-05-13T00:44:02.445894199Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:02.447537 env[1200]: time="2025-05-13T00:44:02.447489114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:02.449127 env[1200]: time="2025-05-13T00:44:02.449087657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:02.449463 env[1200]: time="2025-05-13T00:44:02.449421098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 00:44:02.450410 env[1200]: time="2025-05-13T00:44:02.450375212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:44:02.460433 env[1200]: time="2025-05-13T00:44:02.460389037Z" level=info msg="CreateContainer within sandbox \"8c11d200665f25bbef7c2c9075a4ee6fb72c660cffc1e3c395edcae98ee925b9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:44:02.472985 env[1200]: time="2025-05-13T00:44:02.472933338Z" level=info msg="CreateContainer within sandbox \"8c11d200665f25bbef7c2c9075a4ee6fb72c660cffc1e3c395edcae98ee925b9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"14c77472daee4682fdbeab814c332910f309fc931f717c6f377ce28723d5796b\"" May 13 00:44:02.473496 env[1200]: time="2025-05-13T00:44:02.473473961Z" level=info msg="StartContainer for \"14c77472daee4682fdbeab814c332910f309fc931f717c6f377ce28723d5796b\"" May 13 00:44:02.490002 systemd[1]: Started cri-containerd-14c77472daee4682fdbeab814c332910f309fc931f717c6f377ce28723d5796b.scope. May 13 00:44:02.505711 kernel: kauditd_printk_skb: 166 callbacks suppressed May 13 00:44:02.505870 kernel: audit: type=1400 audit(1747097042.502:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.509861 kernel: audit: type=1400 audit(1747097042.502:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.509914 kernel: audit: type=1400 audit(1747097042.502:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512735 kernel: audit: type=1400 audit(1747097042.502:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518610 kernel: audit: type=1400 audit(1747097042.502:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518655 kernel: audit: type=1400 audit(1747097042.502:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.524599 kernel: audit: type=1400 audit(1747097042.502:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.524678 kernel: audit: type=1400 audit(1747097042.502:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.530418 kernel: audit: type=1400 audit(1747097042.502:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.530463 kernel: audit: type=1400 audit(1747097042.506:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.506000 audit: BPF prog-id=132 op=LOAD May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2392 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633737343732646165653436383266646265616238313463333332 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2392 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633737343732646165653436383266646265616238313463333332 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.507000 audit: BPF prog-id=133 op=LOAD May 13 00:44:02.507000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ccb70 items=0 ppid=2392 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633737343732646165653436383266646265616238313463333332 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.512000 audit: BPF prog-id=134 op=LOAD May 13 00:44:02.512000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ccbb8 items=0 ppid=2392 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633737343732646165653436383266646265616238313463333332 May 13 00:44:02.518000 audit: BPF prog-id=134 op=UNLOAD May 13 00:44:02.518000 audit: BPF prog-id=133 op=UNLOAD May 13 00:44:02.518000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:02.518000 audit: BPF prog-id=135 op=LOAD May 13 00:44:02.518000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ccfc8 items=0 ppid=2392 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633737343732646165653436383266646265616238313463333332 May 13 00:44:02.683108 env[1200]: time="2025-05-13T00:44:02.683019153Z" level=info msg="StartContainer for \"14c77472daee4682fdbeab814c332910f309fc931f717c6f377ce28723d5796b\" returns successfully" May 13 00:44:02.738722 kubelet[1940]: E0513 00:44:02.738579 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:02.797981 kubelet[1940]: E0513 00:44:02.797926 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:03.798812 kubelet[1940]: I0513 00:44:03.798766 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:44:03.799245 kubelet[1940]: E0513 00:44:03.799025 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:04.738605 kubelet[1940]: E0513 00:44:04.738556 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:06.739423 kubelet[1940]: E0513 00:44:06.739357 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:08.739105 kubelet[1940]: E0513 00:44:08.739035 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:09.501930 systemd[1]: Started sshd@7-10.0.0.77:22-10.0.0.1:50302.service. May 13 00:44:09.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.77:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:09.503688 kernel: kauditd_printk_skb: 47 callbacks suppressed May 13 00:44:09.503755 kernel: audit: type=1130 audit(1747097049.501:991): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.77:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:09.560000 audit[2572]: USER_ACCT pid=2572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.561784 sshd[2572]: Accepted publickey for core from 10.0.0.1 port 50302 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:09.565000 audit[2572]: CRED_ACQ pid=2572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.566900 sshd[2572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:09.573534 kernel: audit: type=1101 audit(1747097049.560:992): pid=2572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.573727 kernel: audit: type=1103 audit(1747097049.565:993): pid=2572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.573760 kernel: audit: type=1006 audit(1747097049.565:994): pid=2572 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 13 00:44:09.571071 systemd-logind[1190]: New session 8 of user core. May 13 00:44:09.571377 systemd[1]: Started session-8.scope. May 13 00:44:09.565000 audit[2572]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdc4520f0 a2=3 a3=0 items=0 ppid=1 pid=2572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.565000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:09.580616 kernel: audit: type=1300 audit(1747097049.565:994): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdc4520f0 a2=3 a3=0 items=0 ppid=1 pid=2572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.580684 kernel: audit: type=1327 audit(1747097049.565:994): proctitle=737368643A20636F7265205B707269765D May 13 00:44:09.580708 kernel: audit: type=1105 audit(1747097049.575:995): pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.575000 audit[2572]: USER_START pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.576000 audit[2574]: CRED_ACQ pid=2574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.589656 kernel: audit: type=1103 audit(1747097049.576:996): pid=2574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.691305 sshd[2572]: pam_unix(sshd:session): session closed for user core May 13 00:44:09.691000 audit[2572]: USER_END pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.694131 systemd[1]: sshd@7-10.0.0.77:22-10.0.0.1:50302.service: Deactivated successfully. May 13 00:44:09.697771 kernel: audit: type=1106 audit(1747097049.691:997): pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.694811 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:44:09.695186 systemd-logind[1190]: Session 8 logged out. Waiting for processes to exit. May 13 00:44:09.696007 systemd-logind[1190]: Removed session 8. May 13 00:44:09.691000 audit[2572]: CRED_DISP pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.77:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:09.702735 kernel: audit: type=1104 audit(1747097049.691:998): pid=2572 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:10.863009 kubelet[1940]: E0513 00:44:10.862933 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:11.299085 env[1200]: time="2025-05-13T00:44:11.298939997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:11.302417 env[1200]: time="2025-05-13T00:44:11.302346987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:11.304249 env[1200]: time="2025-05-13T00:44:11.304208215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:11.306033 env[1200]: time="2025-05-13T00:44:11.305999069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:11.306418 env[1200]: time="2025-05-13T00:44:11.306248649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:44:11.308698 env[1200]: time="2025-05-13T00:44:11.308646396Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:44:11.323354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1718795261.mount: Deactivated successfully. May 13 00:44:11.326629 env[1200]: time="2025-05-13T00:44:11.326565451Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600\"" May 13 00:44:11.327160 env[1200]: time="2025-05-13T00:44:11.327127409Z" level=info msg="StartContainer for \"18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600\"" May 13 00:44:11.353869 systemd[1]: Started cri-containerd-18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600.scope. May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fd0da771c88 items=0 ppid=2394 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:11.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663336383039366531316263313736636461343730663732623838 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.369000 audit: BPF prog-id=136 op=LOAD May 13 00:44:11.369000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00020f508 items=0 ppid=2394 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:11.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663336383039366531316263313736636461343730663732623838 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit: BPF prog-id=137 op=LOAD May 13 00:44:11.370000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00020f558 items=0 ppid=2394 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:11.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663336383039366531316263313736636461343730663732623838 May 13 00:44:11.370000 audit: BPF prog-id=137 op=UNLOAD May 13 00:44:11.370000 audit: BPF prog-id=136 op=UNLOAD May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:11.370000 audit: BPF prog-id=138 op=LOAD May 13 00:44:11.370000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00020f5e8 items=0 ppid=2394 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:11.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663336383039366531316263313736636461343730663732623838 May 13 00:44:11.562079 env[1200]: time="2025-05-13T00:44:11.561941977Z" level=info msg="StartContainer for \"18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600\" returns successfully" May 13 00:44:11.868782 kubelet[1940]: E0513 00:44:11.868739 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:12.049283 kubelet[1940]: I0513 00:44:12.049180 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7675dddc4f-vwnc5" podStartSLOduration=10.66206384 podStartE2EDuration="16.049160833s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:43:57.063103769 +0000 UTC m=+13.403545474" lastFinishedPulling="2025-05-13 00:44:02.450200762 +0000 UTC m=+18.790642467" observedRunningTime="2025-05-13 00:44:02.934430443 +0000 UTC m=+19.274872148" watchObservedRunningTime="2025-05-13 00:44:12.049160833 +0000 UTC m=+28.389602538" May 13 00:44:12.320932 systemd[1]: run-containerd-runc-k8s.io-18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600-runc.O5QUra.mount: Deactivated successfully. May 13 00:44:12.739286 kubelet[1940]: E0513 00:44:12.739143 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:12.870328 kubelet[1940]: E0513 00:44:12.870283 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:12.954018 systemd[1]: cri-containerd-18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600.scope: Deactivated successfully. May 13 00:44:12.957000 audit: BPF prog-id=138 op=UNLOAD May 13 00:44:12.973112 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600-rootfs.mount: Deactivated successfully. May 13 00:44:13.078206 kubelet[1940]: I0513 00:44:13.078150 1940 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 00:44:13.083659 env[1200]: time="2025-05-13T00:44:13.083587373Z" level=info msg="shim disconnected" id=18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600 May 13 00:44:13.083659 env[1200]: time="2025-05-13T00:44:13.083647527Z" level=warning msg="cleaning up after shim disconnected" id=18f368096e11bc176cda470f72b886865cafca81dadf5824b559b8fb1f5d2600 namespace=k8s.io May 13 00:44:13.083659 env[1200]: time="2025-05-13T00:44:13.083662094Z" level=info msg="cleaning up dead shim" May 13 00:44:13.095050 env[1200]: time="2025-05-13T00:44:13.094995948Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:44:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2634 runtime=io.containerd.runc.v2\n" May 13 00:44:13.111856 systemd[1]: Created slice kubepods-burstable-pod95580b76_e3ba_4eba_806a_3c305729ce2e.slice. May 13 00:44:13.118700 systemd[1]: Created slice kubepods-besteffort-pod84a5dba7_4a32_4659_9ea5_03aaa37ba959.slice. May 13 00:44:13.123618 systemd[1]: Created slice kubepods-burstable-pod116e3f47_4636_4f9e_a1ad_d8e834632cbf.slice. May 13 00:44:13.127732 systemd[1]: Created slice kubepods-besteffort-pod06a0a1c9_9b4a_4a71_9eb2_846d9b632bc6.slice. May 13 00:44:13.134736 systemd[1]: Created slice kubepods-besteffort-podbde478f5_ae94_4d57_9ddf_f410173484ec.slice. May 13 00:44:13.140139 kubelet[1940]: I0513 00:44:13.140106 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/84a5dba7-4a32-4659-9ea5-03aaa37ba959-tigera-ca-bundle\") pod \"calico-kube-controllers-56b77f9f65-gp9p9\" (UID: \"84a5dba7-4a32-4659-9ea5-03aaa37ba959\") " pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" May 13 00:44:13.140139 kubelet[1940]: I0513 00:44:13.140136 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bde478f5-ae94-4d57-9ddf-f410173484ec-calico-apiserver-certs\") pod \"calico-apiserver-5788cb8d6f-nkqhh\" (UID: \"bde478f5-ae94-4d57-9ddf-f410173484ec\") " pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" May 13 00:44:13.140252 kubelet[1940]: I0513 00:44:13.140154 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjksz\" (UniqueName: \"kubernetes.io/projected/bde478f5-ae94-4d57-9ddf-f410173484ec-kube-api-access-jjksz\") pod \"calico-apiserver-5788cb8d6f-nkqhh\" (UID: \"bde478f5-ae94-4d57-9ddf-f410173484ec\") " pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" May 13 00:44:13.140252 kubelet[1940]: I0513 00:44:13.140168 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/116e3f47-4636-4f9e-a1ad-d8e834632cbf-config-volume\") pod \"coredns-6f6b679f8f-qj2pp\" (UID: \"116e3f47-4636-4f9e-a1ad-d8e834632cbf\") " pod="kube-system/coredns-6f6b679f8f-qj2pp" May 13 00:44:13.140252 kubelet[1940]: I0513 00:44:13.140185 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/95580b76-e3ba-4eba-806a-3c305729ce2e-config-volume\") pod \"coredns-6f6b679f8f-vzrrl\" (UID: \"95580b76-e3ba-4eba-806a-3c305729ce2e\") " pod="kube-system/coredns-6f6b679f8f-vzrrl" May 13 00:44:13.140252 kubelet[1940]: I0513 00:44:13.140212 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f49hf\" (UniqueName: \"kubernetes.io/projected/116e3f47-4636-4f9e-a1ad-d8e834632cbf-kube-api-access-f49hf\") pod \"coredns-6f6b679f8f-qj2pp\" (UID: \"116e3f47-4636-4f9e-a1ad-d8e834632cbf\") " pod="kube-system/coredns-6f6b679f8f-qj2pp" May 13 00:44:13.140252 kubelet[1940]: I0513 00:44:13.140239 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-svcjx\" (UniqueName: \"kubernetes.io/projected/95580b76-e3ba-4eba-806a-3c305729ce2e-kube-api-access-svcjx\") pod \"coredns-6f6b679f8f-vzrrl\" (UID: \"95580b76-e3ba-4eba-806a-3c305729ce2e\") " pod="kube-system/coredns-6f6b679f8f-vzrrl" May 13 00:44:13.140392 kubelet[1940]: I0513 00:44:13.140303 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gx7hj\" (UniqueName: \"kubernetes.io/projected/84a5dba7-4a32-4659-9ea5-03aaa37ba959-kube-api-access-gx7hj\") pod \"calico-kube-controllers-56b77f9f65-gp9p9\" (UID: \"84a5dba7-4a32-4659-9ea5-03aaa37ba959\") " pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" May 13 00:44:13.140392 kubelet[1940]: I0513 00:44:13.140354 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6-calico-apiserver-certs\") pod \"calico-apiserver-5788cb8d6f-2k4jk\" (UID: \"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6\") " pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" May 13 00:44:13.140392 kubelet[1940]: I0513 00:44:13.140375 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k527p\" (UniqueName: \"kubernetes.io/projected/06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6-kube-api-access-k527p\") pod \"calico-apiserver-5788cb8d6f-2k4jk\" (UID: \"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6\") " pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" May 13 00:44:13.416075 kubelet[1940]: E0513 00:44:13.415911 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:13.417021 env[1200]: time="2025-05-13T00:44:13.416972098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vzrrl,Uid:95580b76-e3ba-4eba-806a-3c305729ce2e,Namespace:kube-system,Attempt:0,}" May 13 00:44:13.422568 env[1200]: time="2025-05-13T00:44:13.422526768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56b77f9f65-gp9p9,Uid:84a5dba7-4a32-4659-9ea5-03aaa37ba959,Namespace:calico-system,Attempt:0,}" May 13 00:44:13.427027 kubelet[1940]: E0513 00:44:13.426993 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:13.427529 env[1200]: time="2025-05-13T00:44:13.427479335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj2pp,Uid:116e3f47-4636-4f9e-a1ad-d8e834632cbf,Namespace:kube-system,Attempt:0,}" May 13 00:44:13.430126 env[1200]: time="2025-05-13T00:44:13.430083559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-2k4jk,Uid:06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6,Namespace:calico-apiserver,Attempt:0,}" May 13 00:44:13.436976 env[1200]: time="2025-05-13T00:44:13.436931455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-nkqhh,Uid:bde478f5-ae94-4d57-9ddf-f410173484ec,Namespace:calico-apiserver,Attempt:0,}" May 13 00:44:13.528081 env[1200]: time="2025-05-13T00:44:13.527991380Z" level=error msg="Failed to destroy network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.528446 env[1200]: time="2025-05-13T00:44:13.528405230Z" level=error msg="encountered an error cleaning up failed sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.528446 env[1200]: time="2025-05-13T00:44:13.528390793Z" level=error msg="Failed to destroy network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.528684 env[1200]: time="2025-05-13T00:44:13.528457858Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56b77f9f65-gp9p9,Uid:84a5dba7-4a32-4659-9ea5-03aaa37ba959,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.528770 kubelet[1940]: E0513 00:44:13.528712 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.528838 kubelet[1940]: E0513 00:44:13.528792 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" May 13 00:44:13.528838 kubelet[1940]: E0513 00:44:13.528818 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" May 13 00:44:13.528895 kubelet[1940]: E0513 00:44:13.528857 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-56b77f9f65-gp9p9_calico-system(84a5dba7-4a32-4659-9ea5-03aaa37ba959)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-56b77f9f65-gp9p9_calico-system(84a5dba7-4a32-4659-9ea5-03aaa37ba959)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" podUID="84a5dba7-4a32-4659-9ea5-03aaa37ba959" May 13 00:44:13.530118 env[1200]: time="2025-05-13T00:44:13.530036772Z" level=error msg="encountered an error cleaning up failed sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.530359 env[1200]: time="2025-05-13T00:44:13.530124528Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vzrrl,Uid:95580b76-e3ba-4eba-806a-3c305729ce2e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.530405 kubelet[1940]: E0513 00:44:13.530306 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.530405 kubelet[1940]: E0513 00:44:13.530367 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vzrrl" May 13 00:44:13.530405 kubelet[1940]: E0513 00:44:13.530387 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vzrrl" May 13 00:44:13.530505 kubelet[1940]: E0513 00:44:13.530424 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-vzrrl_kube-system(95580b76-e3ba-4eba-806a-3c305729ce2e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-vzrrl_kube-system(95580b76-e3ba-4eba-806a-3c305729ce2e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vzrrl" podUID="95580b76-e3ba-4eba-806a-3c305729ce2e" May 13 00:44:13.555119 env[1200]: time="2025-05-13T00:44:13.555017917Z" level=error msg="Failed to destroy network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.555440 env[1200]: time="2025-05-13T00:44:13.555397631Z" level=error msg="encountered an error cleaning up failed sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.555505 env[1200]: time="2025-05-13T00:44:13.555449620Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-2k4jk,Uid:06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.555734 kubelet[1940]: E0513 00:44:13.555690 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.555830 kubelet[1940]: E0513 00:44:13.555759 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" May 13 00:44:13.555830 kubelet[1940]: E0513 00:44:13.555778 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" May 13 00:44:13.555909 kubelet[1940]: E0513 00:44:13.555826 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5788cb8d6f-2k4jk_calico-apiserver(06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5788cb8d6f-2k4jk_calico-apiserver(06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" podUID="06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6" May 13 00:44:13.561789 env[1200]: time="2025-05-13T00:44:13.561695192Z" level=error msg="Failed to destroy network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.561950 env[1200]: time="2025-05-13T00:44:13.561910106Z" level=error msg="Failed to destroy network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562164 env[1200]: time="2025-05-13T00:44:13.562121464Z" level=error msg="encountered an error cleaning up failed sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562216 env[1200]: time="2025-05-13T00:44:13.562173031Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-nkqhh,Uid:bde478f5-ae94-4d57-9ddf-f410173484ec,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562302 env[1200]: time="2025-05-13T00:44:13.562234898Z" level=error msg="encountered an error cleaning up failed sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562302 env[1200]: time="2025-05-13T00:44:13.562281936Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj2pp,Uid:116e3f47-4636-4f9e-a1ad-d8e834632cbf,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562408 kubelet[1940]: E0513 00:44:13.562373 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562469 kubelet[1940]: E0513 00:44:13.562426 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" May 13 00:44:13.562469 kubelet[1940]: E0513 00:44:13.562455 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" May 13 00:44:13.562543 kubelet[1940]: E0513 00:44:13.562487 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5788cb8d6f-nkqhh_calico-apiserver(bde478f5-ae94-4d57-9ddf-f410173484ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5788cb8d6f-nkqhh_calico-apiserver(bde478f5-ae94-4d57-9ddf-f410173484ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" podUID="bde478f5-ae94-4d57-9ddf-f410173484ec" May 13 00:44:13.562845 kubelet[1940]: E0513 00:44:13.562791 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.562845 kubelet[1940]: E0513 00:44:13.562849 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qj2pp" May 13 00:44:13.563036 kubelet[1940]: E0513 00:44:13.562871 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qj2pp" May 13 00:44:13.563036 kubelet[1940]: E0513 00:44:13.562908 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-qj2pp_kube-system(116e3f47-4636-4f9e-a1ad-d8e834632cbf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-qj2pp_kube-system(116e3f47-4636-4f9e-a1ad-d8e834632cbf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj2pp" podUID="116e3f47-4636-4f9e-a1ad-d8e834632cbf" May 13 00:44:13.873504 kubelet[1940]: E0513 00:44:13.873368 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:13.874387 kubelet[1940]: I0513 00:44:13.874331 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:13.874576 env[1200]: time="2025-05-13T00:44:13.874532040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:44:13.875362 env[1200]: time="2025-05-13T00:44:13.875309194Z" level=info msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" May 13 00:44:13.875858 kubelet[1940]: I0513 00:44:13.875839 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:13.876555 env[1200]: time="2025-05-13T00:44:13.876527999Z" level=info msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" May 13 00:44:13.878143 kubelet[1940]: I0513 00:44:13.878119 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:13.878545 env[1200]: time="2025-05-13T00:44:13.878500594Z" level=info msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" May 13 00:44:13.880657 kubelet[1940]: I0513 00:44:13.880638 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:13.881008 env[1200]: time="2025-05-13T00:44:13.880970715Z" level=info msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" May 13 00:44:13.881912 kubelet[1940]: I0513 00:44:13.881884 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:13.882265 env[1200]: time="2025-05-13T00:44:13.882236118Z" level=info msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" May 13 00:44:13.919452 env[1200]: time="2025-05-13T00:44:13.919380579Z" level=error msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" failed" error="failed to destroy network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.919675 kubelet[1940]: E0513 00:44:13.919612 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:13.919784 kubelet[1940]: E0513 00:44:13.919690 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b"} May 13 00:44:13.919784 kubelet[1940]: E0513 00:44:13.919748 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"116e3f47-4636-4f9e-a1ad-d8e834632cbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:13.919784 kubelet[1940]: E0513 00:44:13.919771 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"116e3f47-4636-4f9e-a1ad-d8e834632cbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj2pp" podUID="116e3f47-4636-4f9e-a1ad-d8e834632cbf" May 13 00:44:13.924797 env[1200]: time="2025-05-13T00:44:13.924754269Z" level=error msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" failed" error="failed to destroy network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.924997 kubelet[1940]: E0513 00:44:13.924938 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:13.925075 kubelet[1940]: E0513 00:44:13.925003 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5"} May 13 00:44:13.925075 kubelet[1940]: E0513 00:44:13.925042 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bde478f5-ae94-4d57-9ddf-f410173484ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:13.925183 kubelet[1940]: E0513 00:44:13.925091 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bde478f5-ae94-4d57-9ddf-f410173484ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" podUID="bde478f5-ae94-4d57-9ddf-f410173484ec" May 13 00:44:13.927556 env[1200]: time="2025-05-13T00:44:13.927484010Z" level=error msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" failed" error="failed to destroy network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.927789 kubelet[1940]: E0513 00:44:13.927757 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:13.927856 kubelet[1940]: E0513 00:44:13.927799 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e"} May 13 00:44:13.927856 kubelet[1940]: E0513 00:44:13.927829 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:13.927856 kubelet[1940]: E0513 00:44:13.927850 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" podUID="06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6" May 13 00:44:13.928397 env[1200]: time="2025-05-13T00:44:13.928344249Z" level=error msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" failed" error="failed to destroy network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.928867 kubelet[1940]: E0513 00:44:13.928738 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:13.928867 kubelet[1940]: E0513 00:44:13.928781 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae"} May 13 00:44:13.928867 kubelet[1940]: E0513 00:44:13.928816 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"95580b76-e3ba-4eba-806a-3c305729ce2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:13.928867 kubelet[1940]: E0513 00:44:13.928841 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"95580b76-e3ba-4eba-806a-3c305729ce2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vzrrl" podUID="95580b76-e3ba-4eba-806a-3c305729ce2e" May 13 00:44:13.929238 env[1200]: time="2025-05-13T00:44:13.929188199Z" level=error msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" failed" error="failed to destroy network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:13.929447 kubelet[1940]: E0513 00:44:13.929408 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:13.929447 kubelet[1940]: E0513 00:44:13.929439 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137"} May 13 00:44:13.929644 kubelet[1940]: E0513 00:44:13.929469 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84a5dba7-4a32-4659-9ea5-03aaa37ba959\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:13.929644 kubelet[1940]: E0513 00:44:13.929495 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84a5dba7-4a32-4659-9ea5-03aaa37ba959\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" podUID="84a5dba7-4a32-4659-9ea5-03aaa37ba959" May 13 00:44:14.322297 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137-shm.mount: Deactivated successfully. May 13 00:44:14.322387 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae-shm.mount: Deactivated successfully. May 13 00:44:14.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.77:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:14.697934 kernel: kauditd_printk_skb: 45 callbacks suppressed May 13 00:44:14.697977 kernel: audit: type=1130 audit(1747097054.696:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.77:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:14.696641 systemd[1]: Started sshd@8-10.0.0.77:22-10.0.0.1:48708.service. May 13 00:44:14.738000 audit[2969]: USER_ACCT pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.739710 sshd[2969]: Accepted publickey for core from 10.0.0.1 port 48708 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:14.741384 sshd[2969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:14.740000 audit[2969]: CRED_ACQ pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.743674 systemd[1]: Created slice kubepods-besteffort-pod94dec563_a208_445d_befe_67b1bf96f70e.slice. May 13 00:44:14.746557 env[1200]: time="2025-05-13T00:44:14.746519648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z6bj,Uid:94dec563-a208-445d-befe-67b1bf96f70e,Namespace:calico-system,Attempt:0,}" May 13 00:44:14.747294 systemd-logind[1190]: New session 9 of user core. May 13 00:44:14.748030 systemd[1]: Started session-9.scope. May 13 00:44:14.748121 kernel: audit: type=1101 audit(1747097054.738:1008): pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.748156 kernel: audit: type=1103 audit(1747097054.740:1009): pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.748180 kernel: audit: type=1006 audit(1747097054.740:1010): pid=2969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 13 00:44:14.740000 audit[2969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccda81c00 a2=3 a3=0 items=0 ppid=1 pid=2969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:14.755102 kernel: audit: type=1300 audit(1747097054.740:1010): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccda81c00 a2=3 a3=0 items=0 ppid=1 pid=2969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:14.755234 kernel: audit: type=1327 audit(1747097054.740:1010): proctitle=737368643A20636F7265205B707269765D May 13 00:44:14.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:14.756593 kernel: audit: type=1105 audit(1747097054.751:1011): pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.751000 audit[2969]: USER_START pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.752000 audit[2971]: CRED_ACQ pid=2971 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.764282 kernel: audit: type=1103 audit(1747097054.752:1012): pid=2971 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.809142 env[1200]: time="2025-05-13T00:44:14.809075083Z" level=error msg="Failed to destroy network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:14.809718 env[1200]: time="2025-05-13T00:44:14.809691885Z" level=error msg="encountered an error cleaning up failed sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:14.809839 env[1200]: time="2025-05-13T00:44:14.809811520Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z6bj,Uid:94dec563-a208-445d-befe-67b1bf96f70e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:14.810523 kubelet[1940]: E0513 00:44:14.810162 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:14.810523 kubelet[1940]: E0513 00:44:14.810229 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7z6bj" May 13 00:44:14.810523 kubelet[1940]: E0513 00:44:14.810249 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7z6bj" May 13 00:44:14.810643 kubelet[1940]: E0513 00:44:14.810288 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7z6bj_calico-system(94dec563-a208-445d-befe-67b1bf96f70e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7z6bj_calico-system(94dec563-a208-445d-befe-67b1bf96f70e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:14.811325 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd-shm.mount: Deactivated successfully. May 13 00:44:14.858746 sshd[2969]: pam_unix(sshd:session): session closed for user core May 13 00:44:14.859000 audit[2969]: USER_END pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.861395 systemd[1]: sshd@8-10.0.0.77:22-10.0.0.1:48708.service: Deactivated successfully. May 13 00:44:14.862238 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:44:14.863028 systemd-logind[1190]: Session 9 logged out. Waiting for processes to exit. May 13 00:44:14.863847 systemd-logind[1190]: Removed session 9. May 13 00:44:14.859000 audit[2969]: CRED_DISP pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.867380 kernel: audit: type=1106 audit(1747097054.859:1013): pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.867450 kernel: audit: type=1104 audit(1747097054.859:1014): pid=2969 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:14.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.77:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:14.885012 kubelet[1940]: I0513 00:44:14.884981 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:14.885533 env[1200]: time="2025-05-13T00:44:14.885497167Z" level=info msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" May 13 00:44:14.908714 env[1200]: time="2025-05-13T00:44:14.908636242Z" level=error msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" failed" error="failed to destroy network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:14.908989 kubelet[1940]: E0513 00:44:14.908934 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:14.909082 kubelet[1940]: E0513 00:44:14.908999 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd"} May 13 00:44:14.909082 kubelet[1940]: E0513 00:44:14.909042 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"94dec563-a208-445d-befe-67b1bf96f70e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:14.909082 kubelet[1940]: E0513 00:44:14.909066 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"94dec563-a208-445d-befe-67b1bf96f70e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z6bj" podUID="94dec563-a208-445d-befe-67b1bf96f70e" May 13 00:44:18.277797 kubelet[1940]: I0513 00:44:18.277197 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:44:18.277797 kubelet[1940]: E0513 00:44:18.277501 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:18.300000 audit[3044]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.300000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd3c9777a0 a2=0 a3=7ffd3c97778c items=0 ppid=2086 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.306000 audit[3044]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.306000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd3c9777a0 a2=0 a3=7ffd3c97778c items=0 ppid=2086 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.898872 kubelet[1940]: E0513 00:44:18.898818 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:19.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.77:22-10.0.0.1:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:19.863529 systemd[1]: Started sshd@9-10.0.0.77:22-10.0.0.1:48722.service. May 13 00:44:19.868175 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:44:19.868253 kernel: audit: type=1130 audit(1747097059.863:1018): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.77:22-10.0.0.1:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:19.905000 audit[3046]: USER_ACCT pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.909000 audit[3046]: CRED_ACQ pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.910241 sshd[3046]: Accepted publickey for core from 10.0.0.1 port 48722 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:19.910558 sshd[3046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:19.910739 kernel: audit: type=1101 audit(1747097059.905:1019): pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.910773 kernel: audit: type=1103 audit(1747097059.909:1020): pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.915227 systemd-logind[1190]: New session 10 of user core. May 13 00:44:19.915883 systemd[1]: Started session-10.scope. May 13 00:44:19.917497 kernel: audit: type=1006 audit(1747097059.909:1021): pid=3046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:44:19.917560 kernel: audit: type=1300 audit(1747097059.909:1021): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe253e8100 a2=3 a3=0 items=0 ppid=1 pid=3046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:19.909000 audit[3046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe253e8100 a2=3 a3=0 items=0 ppid=1 pid=3046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:19.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:19.923997 kernel: audit: type=1327 audit(1747097059.909:1021): proctitle=737368643A20636F7265205B707269765D May 13 00:44:19.921000 audit[3046]: USER_START pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.930066 kernel: audit: type=1105 audit(1747097059.921:1022): pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.935167 kernel: audit: type=1103 audit(1747097059.923:1023): pid=3048 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:19.923000 audit[3048]: CRED_ACQ pid=3048 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:20.030276 sshd[3046]: pam_unix(sshd:session): session closed for user core May 13 00:44:20.030000 audit[3046]: USER_END pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:20.033199 systemd[1]: sshd@9-10.0.0.77:22-10.0.0.1:48722.service: Deactivated successfully. May 13 00:44:20.033928 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:44:20.034560 systemd-logind[1190]: Session 10 logged out. Waiting for processes to exit. May 13 00:44:20.036691 kernel: audit: type=1106 audit(1747097060.030:1024): pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:20.035656 systemd-logind[1190]: Removed session 10. May 13 00:44:20.030000 audit[3046]: CRED_DISP pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:20.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.77:22-10.0.0.1:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:20.040698 kernel: audit: type=1104 audit(1747097060.030:1025): pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:21.428149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1400209029.mount: Deactivated successfully. May 13 00:44:21.806661 env[1200]: time="2025-05-13T00:44:21.806510707Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:21.808967 env[1200]: time="2025-05-13T00:44:21.808933142Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:21.810691 env[1200]: time="2025-05-13T00:44:21.810642817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:21.812417 env[1200]: time="2025-05-13T00:44:21.812387577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:21.812833 env[1200]: time="2025-05-13T00:44:21.812803669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:44:21.820359 env[1200]: time="2025-05-13T00:44:21.820312367Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:44:21.836166 env[1200]: time="2025-05-13T00:44:21.836105481Z" level=info msg="CreateContainer within sandbox \"747e4392fa852e40ecc3020941ad1e761b83c7e9fb6a1ff71151035a2dac8d3c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5da4932a27f6fde39042c737046bc15c63d0638028566e3ba8e52d66152df96e\"" May 13 00:44:21.837647 env[1200]: time="2025-05-13T00:44:21.836551199Z" level=info msg="StartContainer for \"5da4932a27f6fde39042c737046bc15c63d0638028566e3ba8e52d66152df96e\"" May 13 00:44:21.853706 systemd[1]: Started cri-containerd-5da4932a27f6fde39042c737046bc15c63d0638028566e3ba8e52d66152df96e.scope. May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8e587647c8 items=0 ppid=2394 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613439333261323766366664653339303432633733373034366263 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit: BPF prog-id=139 op=LOAD May 13 00:44:21.875000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c80f8 items=0 ppid=2394 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613439333261323766366664653339303432633733373034366263 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit: BPF prog-id=140 op=LOAD May 13 00:44:21.875000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8148 items=0 ppid=2394 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613439333261323766366664653339303432633733373034366263 May 13 00:44:21.875000 audit: BPF prog-id=140 op=UNLOAD May 13 00:44:21.875000 audit: BPF prog-id=139 op=UNLOAD May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:21.875000 audit: BPF prog-id=141 op=LOAD May 13 00:44:21.875000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c81d8 items=0 ppid=2394 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613439333261323766366664653339303432633733373034366263 May 13 00:44:22.190751 env[1200]: time="2025-05-13T00:44:22.190697290Z" level=info msg="StartContainer for \"5da4932a27f6fde39042c737046bc15c63d0638028566e3ba8e52d66152df96e\" returns successfully" May 13 00:44:22.204503 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:44:22.204629 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:44:23.195434 kubelet[1940]: E0513 00:44:23.195398 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:24.197172 kubelet[1940]: E0513 00:44:24.197126 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:24.215442 systemd[1]: run-containerd-runc-k8s.io-5da4932a27f6fde39042c737046bc15c63d0638028566e3ba8e52d66152df96e-runc.MMWzkU.mount: Deactivated successfully. May 13 00:44:24.474000 audit[3214]: AVC avc: denied { write } for pid=3214 comm="tee" name="fd" dev="proc" ino=25670 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.474000 audit[3214]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff79e4fa26 a2=241 a3=1b6 items=1 ppid=3184 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.474000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:44:24.474000 audit: PATH item=0 name="/dev/fd/63" inode=25663 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.476000 audit[3218]: AVC avc: denied { write } for pid=3218 comm="tee" name="fd" dev="proc" ino=24659 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.476000 audit[3218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff93005a17 a2=241 a3=1b6 items=1 ppid=3185 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.476000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:44:24.476000 audit: PATH item=0 name="/dev/fd/63" inode=24489 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.480000 audit[3232]: AVC avc: denied { write } for pid=3232 comm="tee" name="fd" dev="proc" ino=21460 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.480000 audit[3232]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeea0ada28 a2=241 a3=1b6 items=1 ppid=3187 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.480000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:44:24.480000 audit: PATH item=0 name="/dev/fd/63" inode=21454 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.480000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.481000 audit[3234]: AVC avc: denied { write } for pid=3234 comm="tee" name="fd" dev="proc" ino=21464 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.481000 audit[3234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea2f2ca26 a2=241 a3=1b6 items=1 ppid=3194 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.481000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:44:24.481000 audit: PATH item=0 name="/dev/fd/63" inode=21457 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.490000 audit[3249]: AVC avc: denied { write } for pid=3249 comm="tee" name="fd" dev="proc" ino=24493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.490000 audit[3249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd79620a27 a2=241 a3=1b6 items=1 ppid=3186 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.490000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:44:24.490000 audit: PATH item=0 name="/dev/fd/63" inode=25678 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.493000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=25681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.493000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7bfaea16 a2=241 a3=1b6 items=1 ppid=3200 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.493000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:44:24.493000 audit: PATH item=0 name="/dev/fd/63" inode=24495 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.493000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.509000 audit[3243]: AVC avc: denied { write } for pid=3243 comm="tee" name="fd" dev="proc" ino=24671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:24.509000 audit[3243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf8947a26 a2=241 a3=1b6 items=1 ppid=3196 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.509000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:44:24.509000 audit: PATH item=0 name="/dev/fd/63" inode=25677 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:24.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.932426 kernel: kauditd_printk_skb: 79 callbacks suppressed May 13 00:44:24.932583 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938963 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.942207 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.945239 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.948272 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.948334 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.951206 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.954316 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.957175 kernel: audit: type=1400 audit(1747097064.930:1040): avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.930000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.960041 kernel: audit: type=1334 audit(1747097064.930:1040): prog-id=142 op=LOAD May 13 00:44:24.930000 audit: BPF prog-id=142 op=LOAD May 13 00:44:24.930000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe63f76800 a2=98 a3=3 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.930000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:24.935000 audit: BPF prog-id=142 op=UNLOAD May 13 00:44:24.935000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.935000 audit: BPF prog-id=143 op=LOAD May 13 00:44:24.935000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe63f765e0 a2=74 a3=540051 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:24.938000 audit: BPF prog-id=143 op=UNLOAD May 13 00:44:24.938000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:24.938000 audit: BPF prog-id=144 op=LOAD May 13 00:44:24.938000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe63f76610 a2=94 a3=2 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:24.938000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:24.938000 audit: BPF prog-id=144 op=UNLOAD May 13 00:44:25.033751 systemd[1]: Started sshd@10-10.0.0.77:22-10.0.0.1:53824.service. May 13 00:44:25.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.77:22-10.0.0.1:53824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.050000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit: BPF prog-id=145 op=LOAD May 13 00:44:25.050000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe63f764d0 a2=40 a3=1 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.050000 audit: BPF prog-id=145 op=UNLOAD May 13 00:44:25.050000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.050000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe63f765a0 a2=50 a3=7ffe63f76680 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f764e0 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe63f76510 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe63f76420 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f76530 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f76510 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f76500 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f76530 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe63f76510 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe63f76530 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe63f76500 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.057000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.057000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe63f76570 a2=28 a3=0 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe63f76320 a2=50 a3=1 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit: BPF prog-id=146 op=LOAD May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe63f76320 a2=94 a3=5 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit: BPF prog-id=146 op=UNLOAD May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe63f763d0 a2=50 a3=1 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe63f764f0 a2=4 a3=38 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe63f76540 a2=94 a3=6 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe63f75cf0 a2=94 a3=83 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.058000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.058000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe63f75cf0 a2=94 a3=83 items=0 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit: BPF prog-id=147 op=LOAD May 13 00:44:25.065000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd4c820e0 a2=98 a3=1999999999999999 items=0 ppid=3239 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.065000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:25.065000 audit: BPF prog-id=147 op=UNLOAD May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit: BPF prog-id=148 op=LOAD May 13 00:44:25.065000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd4c81fc0 a2=74 a3=ffff items=0 ppid=3239 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.065000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:25.065000 audit: BPF prog-id=148 op=UNLOAD May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.065000 audit: BPF prog-id=149 op=LOAD May 13 00:44:25.065000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd4c82000 a2=40 a3=7ffdd4c821e0 items=0 ppid=3239 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.065000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:25.066000 audit: BPF prog-id=149 op=UNLOAD May 13 00:44:25.077000 audit[3308]: USER_ACCT pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.079368 sshd[3308]: Accepted publickey for core from 10.0.0.1 port 53824 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:25.078000 audit[3308]: CRED_ACQ pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.078000 audit[3308]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff94f969b0 a2=3 a3=0 items=0 ppid=1 pid=3308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:25.079950 sshd[3308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:25.085955 systemd[1]: Started session-11.scope. May 13 00:44:25.087295 systemd-logind[1190]: New session 11 of user core. May 13 00:44:25.093000 audit[3308]: USER_START pid=3308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.094000 audit[3326]: CRED_ACQ pid=3326 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.109840 systemd-networkd[1023]: vxlan.calico: Link UP May 13 00:44:25.109852 systemd-networkd[1023]: vxlan.calico: Gained carrier May 13 00:44:25.130000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.130000 audit: BPF prog-id=150 op=LOAD May 13 00:44:25.130000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffceac4ac60 a2=98 a3=ffffffff items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.131000 audit: BPF prog-id=150 op=UNLOAD May 13 00:44:25.131000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.131000 audit: BPF prog-id=151 op=LOAD May 13 00:44:25.131000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffceac4aa70 a2=74 a3=540051 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.132000 audit: BPF prog-id=151 op=UNLOAD May 13 00:44:25.132000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.132000 audit: BPF prog-id=152 op=LOAD May 13 00:44:25.132000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffceac4aaa0 a2=94 a3=2 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.133000 audit: BPF prog-id=152 op=UNLOAD May 13 00:44:25.133000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.133000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4a970 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.133000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.133000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceac4a9a0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.134000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.134000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceac4a8b0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.134000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.134000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.134000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4a9c0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.134000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.134000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.134000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4a9a0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.134000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.134000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.134000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4a990 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.134000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.135000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.135000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4a9c0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.135000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.135000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceac4a9a0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.136000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.136000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceac4a9c0 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.136000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.136000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceac4a990 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.136000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.136000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffceac4aa00 a2=28 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.137000 audit: BPF prog-id=153 op=LOAD May 13 00:44:25.137000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffceac4a870 a2=40 a3=0 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.137000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.139000 audit: BPF prog-id=153 op=UNLOAD May 13 00:44:25.139000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.139000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffceac4a860 a2=50 a3=2800 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.139000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffceac4a860 a2=50 a3=2800 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.140000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.140000 audit: BPF prog-id=154 op=LOAD May 13 00:44:25.140000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffceac4a080 a2=94 a3=2 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.140000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.141000 audit: BPF prog-id=154 op=UNLOAD May 13 00:44:25.141000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.141000 audit: BPF prog-id=155 op=LOAD May 13 00:44:25.141000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffceac4a180 a2=94 a3=30 items=0 ppid=3239 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.141000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.146000 audit: BPF prog-id=156 op=LOAD May 13 00:44:25.146000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc77f57980 a2=98 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.147000 audit: BPF prog-id=156 op=UNLOAD May 13 00:44:25.147000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.147000 audit: BPF prog-id=157 op=LOAD May 13 00:44:25.147000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc77f57760 a2=74 a3=540051 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.149000 audit: BPF prog-id=157 op=UNLOAD May 13 00:44:25.149000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.149000 audit: BPF prog-id=158 op=LOAD May 13 00:44:25.149000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc77f57790 a2=94 a3=2 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.149000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.150000 audit: BPF prog-id=158 op=UNLOAD May 13 00:44:25.230044 sshd[3308]: pam_unix(sshd:session): session closed for user core May 13 00:44:25.231000 audit[3308]: USER_END pid=3308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.231000 audit[3308]: CRED_DISP pid=3308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.77:22-10.0.0.1:53832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.234304 systemd[1]: Started sshd@11-10.0.0.77:22-10.0.0.1:53832.service. May 13 00:44:25.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.77:22-10.0.0.1:53824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.237296 systemd[1]: sshd@10-10.0.0.77:22-10.0.0.1:53824.service: Deactivated successfully. May 13 00:44:25.237854 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:44:25.241359 systemd-logind[1190]: Session 11 logged out. Waiting for processes to exit. May 13 00:44:25.242443 systemd-logind[1190]: Removed session 11. May 13 00:44:25.259000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.259000 audit: BPF prog-id=159 op=LOAD May 13 00:44:25.259000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc77f57650 a2=40 a3=1 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.259000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.260000 audit: BPF prog-id=159 op=UNLOAD May 13 00:44:25.260000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.260000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc77f57720 a2=50 a3=7ffc77f57800 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.260000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f57660 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77f57690 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77f575a0 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f576b0 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f57690 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f57680 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f576b0 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77f57690 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77f576b0 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77f57680 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc77f576f0 a2=28 a3=0 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc77f574a0 a2=50 a3=1 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit: BPF prog-id=160 op=LOAD May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc77f574a0 a2=94 a3=5 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit: BPF prog-id=160 op=UNLOAD May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc77f57550 a2=50 a3=1 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc77f57670 a2=4 a3=38 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.267000 audit[3357]: AVC avc: denied { confidentiality } for pid=3357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.267000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc77f576c0 a2=94 a3=6 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { confidentiality } for pid=3357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc77f56e70 a2=94 a3=83 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { confidentiality } for pid=3357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc77f56e70 a2=94 a3=83 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc77f588b0 a2=10 a3=208 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc77f58750 a2=10 a3=3 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc77f586f0 a2=10 a3=3 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.268000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:25.268000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc77f586f0 a2=10 a3=7 items=0 ppid=3239 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:25.275000 audit: BPF prog-id=155 op=UNLOAD May 13 00:44:25.275000 audit[3361]: USER_ACCT pid=3361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.276524 sshd[3361]: Accepted publickey for core from 10.0.0.1 port 53832 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:25.276000 audit[3361]: CRED_ACQ pid=3361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.276000 audit[3361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2da43660 a2=3 a3=0 items=0 ppid=1 pid=3361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:25.277595 sshd[3361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:25.280980 systemd-logind[1190]: New session 12 of user core. May 13 00:44:25.281793 systemd[1]: Started session-12.scope. May 13 00:44:25.285000 audit[3361]: USER_START pid=3361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.286000 audit[3370]: CRED_ACQ pid=3370 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.322000 audit[3387]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:25.322000 audit[3387]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe06466980 a2=0 a3=7ffe0646696c items=0 ppid=3239 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:25.324000 audit[3386]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:25.324000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff19c940a0 a2=0 a3=7fff19c9408c items=0 ppid=3239 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:25.331000 audit[3391]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:25.331000 audit[3391]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff078a9e10 a2=0 a3=7fff078a9dfc items=0 ppid=3239 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.331000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:25.333000 audit[3385]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:25.333000 audit[3385]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd59a6a7d0 a2=0 a3=7ffd59a6a7bc items=0 ppid=3239 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:25.422040 sshd[3361]: pam_unix(sshd:session): session closed for user core May 13 00:44:25.425000 audit[3361]: USER_END pid=3361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.426257 systemd[1]: Started sshd@12-10.0.0.77:22-10.0.0.1:53834.service. May 13 00:44:25.425000 audit[3361]: CRED_DISP pid=3361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.77:22-10.0.0.1:53834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.427828 systemd[1]: sshd@11-10.0.0.77:22-10.0.0.1:53832.service: Deactivated successfully. May 13 00:44:25.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.77:22-10.0.0.1:53832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.428567 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:44:25.429656 systemd-logind[1190]: Session 12 logged out. Waiting for processes to exit. May 13 00:44:25.431280 systemd-logind[1190]: Removed session 12. May 13 00:44:25.471000 audit[3404]: USER_ACCT pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.472787 sshd[3404]: Accepted publickey for core from 10.0.0.1 port 53834 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:25.474000 audit[3404]: CRED_ACQ pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.474000 audit[3404]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff282e7540 a2=3 a3=0 items=0 ppid=1 pid=3404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:25.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:25.475975 sshd[3404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:25.480872 systemd-logind[1190]: New session 13 of user core. May 13 00:44:25.482037 systemd[1]: Started session-13.scope. May 13 00:44:25.486000 audit[3404]: USER_START pid=3404 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.488000 audit[3408]: CRED_ACQ pid=3408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.628374 sshd[3404]: pam_unix(sshd:session): session closed for user core May 13 00:44:25.628000 audit[3404]: USER_END pid=3404 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.628000 audit[3404]: CRED_DISP pid=3404 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:25.631249 systemd[1]: sshd@12-10.0.0.77:22-10.0.0.1:53834.service: Deactivated successfully. May 13 00:44:25.631959 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:44:25.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.77:22-10.0.0.1:53834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:25.632590 systemd-logind[1190]: Session 13 logged out. Waiting for processes to exit. May 13 00:44:25.633474 systemd-logind[1190]: Removed session 13. May 13 00:44:25.739510 env[1200]: time="2025-05-13T00:44:25.739286048Z" level=info msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" May 13 00:44:25.786500 kubelet[1940]: I0513 00:44:25.786423 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6vmh6" podStartSLOduration=5.01930011 podStartE2EDuration="29.786399101s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:43:57.04635993 +0000 UTC m=+13.386801635" lastFinishedPulling="2025-05-13 00:44:21.813458921 +0000 UTC m=+38.153900626" observedRunningTime="2025-05-13 00:44:23.288986087 +0000 UTC m=+39.629427782" watchObservedRunningTime="2025-05-13 00:44:25.786399101 +0000 UTC m=+42.126840836" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.785 [INFO][3438] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.786 [INFO][3438] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" iface="eth0" netns="/var/run/netns/cni-6bb45f67-1614-eca4-90a3-41dfd380b87e" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.786 [INFO][3438] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" iface="eth0" netns="/var/run/netns/cni-6bb45f67-1614-eca4-90a3-41dfd380b87e" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.787 [INFO][3438] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" iface="eth0" netns="/var/run/netns/cni-6bb45f67-1614-eca4-90a3-41dfd380b87e" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.787 [INFO][3438] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.787 [INFO][3438] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.833 [INFO][3447] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.834 [INFO][3447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.834 [INFO][3447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.840 [WARNING][3447] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.840 [INFO][3447] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.842 [INFO][3447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:25.845641 env[1200]: 2025-05-13 00:44:25.844 [INFO][3438] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:25.846397 env[1200]: time="2025-05-13T00:44:25.845800717Z" level=info msg="TearDown network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" successfully" May 13 00:44:25.846397 env[1200]: time="2025-05-13T00:44:25.845842606Z" level=info msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" returns successfully" May 13 00:44:25.846478 kubelet[1940]: E0513 00:44:25.846204 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:25.846900 env[1200]: time="2025-05-13T00:44:25.846867792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vzrrl,Uid:95580b76-e3ba-4eba-806a-3c305729ce2e,Namespace:kube-system,Attempt:1,}" May 13 00:44:25.848306 systemd[1]: run-netns-cni\x2d6bb45f67\x2d1614\x2deca4\x2d90a3\x2d41dfd380b87e.mount: Deactivated successfully. May 13 00:44:26.000937 systemd-networkd[1023]: calic507de938df: Link UP May 13 00:44:26.002315 systemd-networkd[1023]: calic507de938df: Gained carrier May 13 00:44:26.002778 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic507de938df: link becomes ready May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.934 [INFO][3454] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0 coredns-6f6b679f8f- kube-system 95580b76-e3ba-4eba-806a-3c305729ce2e 865 0 2025-05-13 00:43:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-vzrrl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic507de938df [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.934 [INFO][3454] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.963 [INFO][3469] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" HandleID="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.972 [INFO][3469] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" HandleID="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011da60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-vzrrl", "timestamp":"2025-05-13 00:44:25.963888074 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.972 [INFO][3469] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.972 [INFO][3469] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.972 [INFO][3469] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.974 [INFO][3469] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.978 [INFO][3469] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.981 [INFO][3469] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.983 [INFO][3469] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.985 [INFO][3469] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.985 [INFO][3469] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.986 [INFO][3469] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240 May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.990 [INFO][3469] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.996 [INFO][3469] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.996 [INFO][3469] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" host="localhost" May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.996 [INFO][3469] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:26.013523 env[1200]: 2025-05-13 00:44:25.996 [INFO][3469] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" HandleID="k8s-pod-network.b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:25.998 [INFO][3454] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"95580b76-e3ba-4eba-806a-3c305729ce2e", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-vzrrl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic507de938df", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:25.998 [INFO][3454] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:25.998 [INFO][3454] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic507de938df ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:26.002 [INFO][3454] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:26.002 [INFO][3454] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"95580b76-e3ba-4eba-806a-3c305729ce2e", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240", Pod:"coredns-6f6b679f8f-vzrrl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic507de938df", MAC:"9e:df:08:a5:40:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:26.014151 env[1200]: 2025-05-13 00:44:26.011 [INFO][3454] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240" Namespace="kube-system" Pod="coredns-6f6b679f8f-vzrrl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:26.020000 audit[3489]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:26.020000 audit[3489]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcac219ef0 a2=0 a3=7ffcac219edc items=0 ppid=3239 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.020000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:26.028990 env[1200]: time="2025-05-13T00:44:26.028903903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:26.028990 env[1200]: time="2025-05-13T00:44:26.028946383Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:26.028990 env[1200]: time="2025-05-13T00:44:26.028956192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:26.029128 env[1200]: time="2025-05-13T00:44:26.029082709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240 pid=3497 runtime=io.containerd.runc.v2 May 13 00:44:26.042536 systemd[1]: Started cri-containerd-b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240.scope. May 13 00:44:26.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit: BPF prog-id=161 op=LOAD May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3497 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396137373330393564333839343136336539363966333734343833 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3497 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396137373330393564333839343136336539363966333734343833 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit: BPF prog-id=162 op=LOAD May 13 00:44:26.050000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000304c80 items=0 ppid=3497 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396137373330393564333839343136336539363966333734343833 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit: BPF prog-id=163 op=LOAD May 13 00:44:26.050000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000304cc8 items=0 ppid=3497 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396137373330393564333839343136336539363966333734343833 May 13 00:44:26.050000 audit: BPF prog-id=163 op=UNLOAD May 13 00:44:26.050000 audit: BPF prog-id=162 op=UNLOAD May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.050000 audit: BPF prog-id=164 op=LOAD May 13 00:44:26.050000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003050d8 items=0 ppid=3497 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396137373330393564333839343136336539363966333734343833 May 13 00:44:26.052218 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:26.071392 env[1200]: time="2025-05-13T00:44:26.071337774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vzrrl,Uid:95580b76-e3ba-4eba-806a-3c305729ce2e,Namespace:kube-system,Attempt:1,} returns sandbox id \"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240\"" May 13 00:44:26.072005 kubelet[1940]: E0513 00:44:26.071985 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:26.074507 env[1200]: time="2025-05-13T00:44:26.074445854Z" level=info msg="CreateContainer within sandbox \"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:44:26.094627 env[1200]: time="2025-05-13T00:44:26.094566280Z" level=info msg="CreateContainer within sandbox \"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3b1164462440c1df25aa782e5589e2e6120d94d30cbcbda22ad29e71324f97b8\"" May 13 00:44:26.095392 env[1200]: time="2025-05-13T00:44:26.095360241Z" level=info msg="StartContainer for \"3b1164462440c1df25aa782e5589e2e6120d94d30cbcbda22ad29e71324f97b8\"" May 13 00:44:26.110486 systemd[1]: Started cri-containerd-3b1164462440c1df25aa782e5589e2e6120d94d30cbcbda22ad29e71324f97b8.scope. May 13 00:44:26.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.125000 audit: BPF prog-id=165 op=LOAD May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3497 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313136343436323434306331646632356161373832653535383965 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3497 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313136343436323434306331646632356161373832653535383965 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit: BPF prog-id=166 op=LOAD May 13 00:44:26.126000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000247d40 items=0 ppid=3497 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313136343436323434306331646632356161373832653535383965 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit: BPF prog-id=167 op=LOAD May 13 00:44:26.126000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000247d88 items=0 ppid=3497 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313136343436323434306331646632356161373832653535383965 May 13 00:44:26.126000 audit: BPF prog-id=167 op=UNLOAD May 13 00:44:26.126000 audit: BPF prog-id=166 op=UNLOAD May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:26.126000 audit: BPF prog-id=168 op=LOAD May 13 00:44:26.126000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000396198 items=0 ppid=3497 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313136343436323434306331646632356161373832653535383965 May 13 00:44:26.145417 env[1200]: time="2025-05-13T00:44:26.145351223Z" level=info msg="StartContainer for \"3b1164462440c1df25aa782e5589e2e6120d94d30cbcbda22ad29e71324f97b8\" returns successfully" May 13 00:44:26.205101 kubelet[1940]: E0513 00:44:26.204794 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:26.304810 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL May 13 00:44:26.392000 audit[3570]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:26.392000 audit[3570]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc9ec59890 a2=0 a3=7ffc9ec5987c items=0 ppid=2086 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:26.399000 audit[3570]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:26.399000 audit[3570]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc9ec59890 a2=0 a3=0 items=0 ppid=2086 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:27.206042 kubelet[1940]: E0513 00:44:27.205947 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:27.240130 kubelet[1940]: I0513 00:44:27.240045 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-vzrrl" podStartSLOduration=37.240021959 podStartE2EDuration="37.240021959s" podCreationTimestamp="2025-05-13 00:43:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:44:26.319524586 +0000 UTC m=+42.659966291" watchObservedRunningTime="2025-05-13 00:44:27.240021959 +0000 UTC m=+43.580463664" May 13 00:44:27.249000 audit[3574]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:27.249000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffec89daa90 a2=0 a3=7ffec89daa7c items=0 ppid=2086 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:27.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:27.256000 audit[3574]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:27.256000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffec89daa90 a2=0 a3=7ffec89daa7c items=0 ppid=2086 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:27.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:27.392863 systemd-networkd[1023]: calic507de938df: Gained IPv6LL May 13 00:44:27.740092 env[1200]: time="2025-05-13T00:44:27.740023479Z" level=info msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" May 13 00:44:27.740458 env[1200]: time="2025-05-13T00:44:27.740223004Z" level=info msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" May 13 00:44:27.740458 env[1200]: time="2025-05-13T00:44:27.740043466Z" level=info msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" iface="eth0" netns="/var/run/netns/cni-09869480-d2fd-7668-2ff9-6ab9932388ab" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" iface="eth0" netns="/var/run/netns/cni-09869480-d2fd-7668-2ff9-6ab9932388ab" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" iface="eth0" netns="/var/run/netns/cni-09869480-d2fd-7668-2ff9-6ab9932388ab" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:27.996 [INFO][3629] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.018 [INFO][3657] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.018 [INFO][3657] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.019 [INFO][3657] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.027 [WARNING][3657] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.027 [INFO][3657] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.029 [INFO][3657] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.033197 env[1200]: 2025-05-13 00:44:28.031 [INFO][3629] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:28.034871 env[1200]: time="2025-05-13T00:44:28.034807649Z" level=info msg="TearDown network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" successfully" May 13 00:44:28.034871 env[1200]: time="2025-05-13T00:44:28.034855979Z" level=info msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" returns successfully" May 13 00:44:28.035509 env[1200]: time="2025-05-13T00:44:28.035485562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z6bj,Uid:94dec563-a208-445d-befe-67b1bf96f70e,Namespace:calico-system,Attempt:1,}" May 13 00:44:28.035998 systemd[1]: run-netns-cni\x2d09869480\x2dd2fd\x2d7668\x2d2ff9\x2d6ab9932388ab.mount: Deactivated successfully. May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" iface="eth0" netns="/var/run/netns/cni-5cde2ee1-1842-f1a1-8906-702e12429e42" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" iface="eth0" netns="/var/run/netns/cni-5cde2ee1-1842-f1a1-8906-702e12429e42" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" iface="eth0" netns="/var/run/netns/cni-5cde2ee1-1842-f1a1-8906-702e12429e42" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.026 [INFO][3630] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.049 [INFO][3666] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.049 [INFO][3666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.049 [INFO][3666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.055 [WARNING][3666] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.055 [INFO][3666] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.056 [INFO][3666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.059736 env[1200]: 2025-05-13 00:44:28.058 [INFO][3630] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:28.060476 env[1200]: time="2025-05-13T00:44:28.060419973Z" level=info msg="TearDown network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" successfully" May 13 00:44:28.060563 env[1200]: time="2025-05-13T00:44:28.060476930Z" level=info msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" returns successfully" May 13 00:44:28.062173 env[1200]: time="2025-05-13T00:44:28.062124275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-nkqhh,Uid:bde478f5-ae94-4d57-9ddf-f410173484ec,Namespace:calico-apiserver,Attempt:1,}" May 13 00:44:28.062555 systemd[1]: run-netns-cni\x2d5cde2ee1\x2d1842\x2df1a1\x2d8906\x2d702e12429e42.mount: Deactivated successfully. May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" iface="eth0" netns="/var/run/netns/cni-ccd84ba4-1617-797f-9a28-1a8681639722" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" iface="eth0" netns="/var/run/netns/cni-ccd84ba4-1617-797f-9a28-1a8681639722" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" iface="eth0" netns="/var/run/netns/cni-ccd84ba4-1617-797f-9a28-1a8681639722" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:27.982 [INFO][3628] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.051 [INFO][3650] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.051 [INFO][3650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.056 [INFO][3650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.074 [WARNING][3650] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.074 [INFO][3650] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.076 [INFO][3650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.083281 env[1200]: 2025-05-13 00:44:28.080 [INFO][3628] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:28.083905 env[1200]: time="2025-05-13T00:44:28.083674980Z" level=info msg="TearDown network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" successfully" May 13 00:44:28.083905 env[1200]: time="2025-05-13T00:44:28.083723931Z" level=info msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" returns successfully" May 13 00:44:28.084179 kubelet[1940]: E0513 00:44:28.084143 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:28.085097 env[1200]: time="2025-05-13T00:44:28.085064749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj2pp,Uid:116e3f47-4636-4f9e-a1ad-d8e834632cbf,Namespace:kube-system,Attempt:1,}" May 13 00:44:28.085525 systemd[1]: run-netns-cni\x2dccd84ba4\x2d1617\x2d797f\x2d9a28\x2d1a8681639722.mount: Deactivated successfully. May 13 00:44:28.208400 kubelet[1940]: E0513 00:44:28.208053 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:28.211414 systemd-networkd[1023]: cali7335791c02e: Link UP May 13 00:44:28.214067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:44:28.214131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7335791c02e: link becomes ready May 13 00:44:28.214225 systemd-networkd[1023]: cali7335791c02e: Gained carrier May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.112 [INFO][3675] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--7z6bj-eth0 csi-node-driver- calico-system 94dec563-a208-445d-befe-67b1bf96f70e 899 0 2025-05-13 00:43:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-7z6bj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7335791c02e [] []}} ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.113 [INFO][3675] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.169 [INFO][3718] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" HandleID="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.175 [INFO][3718] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" HandleID="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000132ad0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-7z6bj", "timestamp":"2025-05-13 00:44:28.169188973 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.175 [INFO][3718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.175 [INFO][3718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.175 [INFO][3718] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.179 [INFO][3718] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.183 [INFO][3718] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.188 [INFO][3718] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.189 [INFO][3718] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.191 [INFO][3718] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.191 [INFO][3718] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.192 [INFO][3718] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.196 [INFO][3718] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.203 [INFO][3718] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.203 [INFO][3718] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" host="localhost" May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.203 [INFO][3718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.227047 env[1200]: 2025-05-13 00:44:28.203 [INFO][3718] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" HandleID="k8s-pod-network.53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.207 [INFO][3675] cni-plugin/k8s.go 386: Populated endpoint ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z6bj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94dec563-a208-445d-befe-67b1bf96f70e", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-7z6bj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7335791c02e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.207 [INFO][3675] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.207 [INFO][3675] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7335791c02e ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.214 [INFO][3675] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.214 [INFO][3675] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z6bj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94dec563-a208-445d-befe-67b1bf96f70e", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf", Pod:"csi-node-driver-7z6bj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7335791c02e", MAC:"12:46:e8:a2:eb:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.227644 env[1200]: 2025-05-13 00:44:28.224 [INFO][3675] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf" Namespace="calico-system" Pod="csi-node-driver-7z6bj" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:28.235000 audit[3759]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=3759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:28.235000 audit[3759]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe6e7caba0 a2=0 a3=7ffe6e7cab8c items=0 ppid=3239 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.235000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:28.244190 env[1200]: time="2025-05-13T00:44:28.244120015Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:28.244285 env[1200]: time="2025-05-13T00:44:28.244184857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:28.244285 env[1200]: time="2025-05-13T00:44:28.244207650Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:28.244605 env[1200]: time="2025-05-13T00:44:28.244542489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf pid=3768 runtime=io.containerd.runc.v2 May 13 00:44:28.255236 systemd[1]: Started cri-containerd-53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf.scope. May 13 00:44:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit: BPF prog-id=169 op=LOAD May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533663031353436353364333736613731646439653134393730346437 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533663031353436353364333736613731646439653134393730346437 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit: BPF prog-id=170 op=LOAD May 13 00:44:28.267000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029c750 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533663031353436353364333736613731646439653134393730346437 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit: BPF prog-id=171 op=LOAD May 13 00:44:28.267000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029c798 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533663031353436353364333736613731646439653134393730346437 May 13 00:44:28.267000 audit: BPF prog-id=171 op=UNLOAD May 13 00:44:28.267000 audit: BPF prog-id=170 op=UNLOAD May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.267000 audit: BPF prog-id=172 op=LOAD May 13 00:44:28.267000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029cba8 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533663031353436353364333736613731646439653134393730346437 May 13 00:44:28.269342 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:28.280364 env[1200]: time="2025-05-13T00:44:28.280302807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z6bj,Uid:94dec563-a208-445d-befe-67b1bf96f70e,Namespace:calico-system,Attempt:1,} returns sandbox id \"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf\"" May 13 00:44:28.287752 env[1200]: time="2025-05-13T00:44:28.285155031Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:44:28.494530 systemd-networkd[1023]: cali3e40258ddc1: Link UP May 13 00:44:28.496052 systemd-networkd[1023]: cali3e40258ddc1: Gained carrier May 13 00:44:28.496720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e40258ddc1: link becomes ready May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.160 [INFO][3702] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0 coredns-6f6b679f8f- kube-system 116e3f47-4636-4f9e-a1ad-d8e834632cbf 898 0 2025-05-13 00:43:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-qj2pp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3e40258ddc1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.160 [INFO][3702] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.201 [INFO][3739] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" HandleID="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.278 [INFO][3739] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" HandleID="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dae0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-qj2pp", "timestamp":"2025-05-13 00:44:28.201246605 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.278 [INFO][3739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.278 [INFO][3739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.278 [INFO][3739] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.281 [INFO][3739] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.375 [INFO][3739] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.379 [INFO][3739] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.380 [INFO][3739] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.382 [INFO][3739] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.382 [INFO][3739] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.384 [INFO][3739] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.388 [INFO][3739] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.484 [INFO][3739] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.484 [INFO][3739] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" host="localhost" May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.485 [INFO][3739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.624156 env[1200]: 2025-05-13 00:44:28.485 [INFO][3739] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" HandleID="k8s-pod-network.f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.487 [INFO][3702] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"116e3f47-4636-4f9e-a1ad-d8e834632cbf", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-qj2pp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e40258ddc1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.487 [INFO][3702] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.487 [INFO][3702] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e40258ddc1 ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.494 [INFO][3702] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.496 [INFO][3702] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"116e3f47-4636-4f9e-a1ad-d8e834632cbf", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a", Pod:"coredns-6f6b679f8f-qj2pp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e40258ddc1", MAC:"ca:7c:1d:bc:45:44", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.624830 env[1200]: 2025-05-13 00:44:28.622 [INFO][3702] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj2pp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:28.633000 audit[3816]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:28.633000 audit[3816]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff30c4c970 a2=0 a3=7fff30c4c95c items=0 ppid=3239 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.633000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:28.714248 env[1200]: time="2025-05-13T00:44:28.714157901Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:28.714248 env[1200]: time="2025-05-13T00:44:28.714202284Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:28.714248 env[1200]: time="2025-05-13T00:44:28.714213736Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:28.714489 env[1200]: time="2025-05-13T00:44:28.714380579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a pid=3824 runtime=io.containerd.runc.v2 May 13 00:44:28.724146 systemd[1]: Started cri-containerd-f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a.scope. May 13 00:44:28.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit: BPF prog-id=173 op=LOAD May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630363661316435323734373638346135366335373636616635643066 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630363661316435323734373638346135366335373636616635643066 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.733000 audit: BPF prog-id=174 op=LOAD May 13 00:44:28.733000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003087d0 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630363661316435323734373638346135366335373636616635643066 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit: BPF prog-id=175 op=LOAD May 13 00:44:28.734000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308818 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630363661316435323734373638346135366335373636616635643066 May 13 00:44:28.734000 audit: BPF prog-id=175 op=UNLOAD May 13 00:44:28.734000 audit: BPF prog-id=174 op=UNLOAD May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.734000 audit: BPF prog-id=176 op=LOAD May 13 00:44:28.734000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308c28 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630363661316435323734373638346135366335373636616635643066 May 13 00:44:28.735472 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:28.739598 env[1200]: time="2025-05-13T00:44:28.739566763Z" level=info msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" May 13 00:44:28.739677 env[1200]: time="2025-05-13T00:44:28.739602450Z" level=info msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" May 13 00:44:28.765232 env[1200]: time="2025-05-13T00:44:28.764600470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj2pp,Uid:116e3f47-4636-4f9e-a1ad-d8e834632cbf,Namespace:kube-system,Attempt:1,} returns sandbox id \"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a\"" May 13 00:44:28.765619 kubelet[1940]: E0513 00:44:28.765362 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:28.766904 env[1200]: time="2025-05-13T00:44:28.766877167Z" level=info msg="CreateContainer within sandbox \"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:44:28.904322 systemd-networkd[1023]: cali37dcd376c25: Link UP May 13 00:44:28.909036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37dcd376c25: link becomes ready May 13 00:44:28.908780 systemd-networkd[1023]: cali37dcd376c25: Gained carrier May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.133 [INFO][3689] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0 calico-apiserver-5788cb8d6f- calico-apiserver bde478f5-ae94-4d57-9ddf-f410173484ec 900 0 2025-05-13 00:43:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5788cb8d6f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5788cb8d6f-nkqhh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali37dcd376c25 [] []}} ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.133 [INFO][3689] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.174 [INFO][3729] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" HandleID="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.279 [INFO][3729] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" HandleID="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029ecd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5788cb8d6f-nkqhh", "timestamp":"2025-05-13 00:44:28.174209354 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.279 [INFO][3729] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.485 [INFO][3729] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.485 [INFO][3729] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.487 [INFO][3729] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.499 [INFO][3729] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.625 [INFO][3729] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.627 [INFO][3729] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.630 [INFO][3729] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.630 [INFO][3729] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.631 [INFO][3729] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064 May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.665 [INFO][3729] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.899 [INFO][3729] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.899 [INFO][3729] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" host="localhost" May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.899 [INFO][3729] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.927985 env[1200]: 2025-05-13 00:44:28.899 [INFO][3729] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" HandleID="k8s-pod-network.36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.902 [INFO][3689] cni-plugin/k8s.go 386: Populated endpoint ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"bde478f5-ae94-4d57-9ddf-f410173484ec", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5788cb8d6f-nkqhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37dcd376c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.902 [INFO][3689] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.902 [INFO][3689] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali37dcd376c25 ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.909 [INFO][3689] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.909 [INFO][3689] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"bde478f5-ae94-4d57-9ddf-f410173484ec", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064", Pod:"calico-apiserver-5788cb8d6f-nkqhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37dcd376c25", MAC:"22:0d:fc:91:3c:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:28.928991 env[1200]: 2025-05-13 00:44:28.924 [INFO][3689] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-nkqhh" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:28.942000 audit[3935]: NETFILTER_CFG table=filter:108 family=2 entries=58 op=nft_register_chain pid=3935 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:28.942000 audit[3935]: SYSCALL arch=c000003e syscall=46 success=yes exit=29908 a0=3 a1=7fffeaaa1630 a2=0 a3=7fffeaaa161c items=0 ppid=3239 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.942000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:28.947748 env[1200]: time="2025-05-13T00:44:28.947702679Z" level=info msg="CreateContainer within sandbox \"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"97447f362149c1a8c3bd989813d7bd1a2921915159bfc253b3c639277959d9a8\"" May 13 00:44:28.949385 env[1200]: time="2025-05-13T00:44:28.949348962Z" level=info msg="StartContainer for \"97447f362149c1a8c3bd989813d7bd1a2921915159bfc253b3c639277959d9a8\"" May 13 00:44:28.953440 env[1200]: time="2025-05-13T00:44:28.953216798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:28.953440 env[1200]: time="2025-05-13T00:44:28.953257775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:28.953440 env[1200]: time="2025-05-13T00:44:28.953267413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:28.953573 env[1200]: time="2025-05-13T00:44:28.953441299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064 pid=3943 runtime=io.containerd.runc.v2 May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.924 [INFO][3889] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.924 [INFO][3889] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" iface="eth0" netns="/var/run/netns/cni-bb6e2806-0f18-a50d-a9d8-f259cf643917" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.924 [INFO][3889] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" iface="eth0" netns="/var/run/netns/cni-bb6e2806-0f18-a50d-a9d8-f259cf643917" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.925 [INFO][3889] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" iface="eth0" netns="/var/run/netns/cni-bb6e2806-0f18-a50d-a9d8-f259cf643917" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.925 [INFO][3889] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.925 [INFO][3889] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.948 [INFO][3913] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.949 [INFO][3913] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.949 [INFO][3913] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.955 [WARNING][3913] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.956 [INFO][3913] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.957 [INFO][3913] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.960183 env[1200]: 2025-05-13 00:44:28.958 [INFO][3889] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:28.960842 env[1200]: time="2025-05-13T00:44:28.960779214Z" level=info msg="TearDown network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" successfully" May 13 00:44:28.960842 env[1200]: time="2025-05-13T00:44:28.960828346Z" level=info msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" returns successfully" May 13 00:44:28.961580 env[1200]: time="2025-05-13T00:44:28.961539241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-2k4jk,Uid:06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6,Namespace:calico-apiserver,Attempt:1,}" May 13 00:44:28.967264 systemd[1]: Started cri-containerd-97447f362149c1a8c3bd989813d7bd1a2921915159bfc253b3c639277959d9a8.scope. May 13 00:44:28.980651 systemd[1]: Started cri-containerd-36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064.scope. May 13 00:44:28.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.983000 audit: BPF prog-id=177 op=LOAD May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3824 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343437663336323134396331613863336264393839383133643762 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3824 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343437663336323134396331613863336264393839383133643762 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.984000 audit: BPF prog-id=178 op=LOAD May 13 00:44:28.984000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000dbfe0 items=0 ppid=3824 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343437663336323134396331613863336264393839383133643762 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit: BPF prog-id=179 op=LOAD May 13 00:44:28.985000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003ac028 items=0 ppid=3824 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343437663336323134396331613863336264393839383133643762 May 13 00:44:28.985000 audit: BPF prog-id=179 op=UNLOAD May 13 00:44:28.985000 audit: BPF prog-id=178 op=UNLOAD May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:28.985000 audit: BPF prog-id=180 op=LOAD May 13 00:44:28.985000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003ac438 items=0 ppid=3824 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:28.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343437663336323134396331613863336264393839383133643762 May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" iface="eth0" netns="/var/run/netns/cni-9e2f3ea9-83c8-3414-c645-06031d20904b" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" iface="eth0" netns="/var/run/netns/cni-9e2f3ea9-83c8-3414-c645-06031d20904b" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" iface="eth0" netns="/var/run/netns/cni-9e2f3ea9-83c8-3414-c645-06031d20904b" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.929 [INFO][3879] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.964 [INFO][3921] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.964 [INFO][3921] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.964 [INFO][3921] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.975 [WARNING][3921] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.975 [INFO][3921] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.977 [INFO][3921] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:28.998054 env[1200]: 2025-05-13 00:44:28.986 [INFO][3879] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:28.998054 env[1200]: time="2025-05-13T00:44:28.997339414Z" level=info msg="TearDown network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" successfully" May 13 00:44:28.998054 env[1200]: time="2025-05-13T00:44:28.997365103Z" level=info msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" returns successfully" May 13 00:44:28.999142 env[1200]: time="2025-05-13T00:44:28.999110322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56b77f9f65-gp9p9,Uid:84a5dba7-4a32-4659-9ea5-03aaa37ba959,Namespace:calico-system,Attempt:1,}" May 13 00:44:29.006506 env[1200]: time="2025-05-13T00:44:29.006474064Z" level=info msg="StartContainer for \"97447f362149c1a8c3bd989813d7bd1a2921915159bfc253b3c639277959d9a8\" returns successfully" May 13 00:44:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit: BPF prog-id=181 op=LOAD May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3943 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616630353234363465633231613665386663393661376461363337 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3943 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616630353234363465633231613665386663393661376461363337 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit: BPF prog-id=182 op=LOAD May 13 00:44:29.011000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001dcce0 items=0 ppid=3943 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616630353234363465633231613665386663393661376461363337 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.011000 audit: BPF prog-id=183 op=LOAD May 13 00:44:29.011000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001dcd28 items=0 ppid=3943 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616630353234363465633231613665386663393661376461363337 May 13 00:44:29.011000 audit: BPF prog-id=183 op=UNLOAD May 13 00:44:29.011000 audit: BPF prog-id=182 op=UNLOAD May 13 00:44:29.012000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.012000 audit: BPF prog-id=184 op=LOAD May 13 00:44:29.012000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001dd138 items=0 ppid=3943 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616630353234363465633231613665386663393661376461363337 May 13 00:44:29.013389 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:29.046170 systemd[1]: run-netns-cni\x2dbb6e2806\x2d0f18\x2da50d\x2da9d8\x2df259cf643917.mount: Deactivated successfully. May 13 00:44:29.046251 systemd[1]: run-netns-cni\x2d9e2f3ea9\x2d83c8\x2d3414\x2dc645\x2d06031d20904b.mount: Deactivated successfully. May 13 00:44:29.066111 env[1200]: time="2025-05-13T00:44:29.066056693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-nkqhh,Uid:bde478f5-ae94-4d57-9ddf-f410173484ec,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064\"" May 13 00:44:29.117526 systemd-networkd[1023]: cali37df625bfbb: Link UP May 13 00:44:29.119550 systemd-networkd[1023]: cali37df625bfbb: Gained carrier May 13 00:44:29.119690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37df625bfbb: link becomes ready May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.050 [INFO][3993] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0 calico-apiserver-5788cb8d6f- calico-apiserver 06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6 915 0 2025-05-13 00:43:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5788cb8d6f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5788cb8d6f-2k4jk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali37df625bfbb [] []}} ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.050 [INFO][3993] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.073 [INFO][4045] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" HandleID="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.080 [INFO][4045] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" HandleID="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050df0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5788cb8d6f-2k4jk", "timestamp":"2025-05-13 00:44:29.073624918 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.080 [INFO][4045] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.080 [INFO][4045] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.081 [INFO][4045] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.083 [INFO][4045] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.090 [INFO][4045] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.094 [INFO][4045] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.096 [INFO][4045] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.098 [INFO][4045] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.098 [INFO][4045] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.100 [INFO][4045] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.105 [INFO][4045] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.111 [INFO][4045] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.111 [INFO][4045] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" host="localhost" May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.111 [INFO][4045] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:29.133879 env[1200]: 2025-05-13 00:44:29.111 [INFO][4045] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" HandleID="k8s-pod-network.056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.114 [INFO][3993] cni-plugin/k8s.go 386: Populated endpoint ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5788cb8d6f-2k4jk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37df625bfbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.114 [INFO][3993] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.114 [INFO][3993] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali37df625bfbb ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.120 [INFO][3993] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.120 [INFO][3993] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f", Pod:"calico-apiserver-5788cb8d6f-2k4jk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37df625bfbb", MAC:"4e:53:ff:f5:b0:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:29.134771 env[1200]: 2025-05-13 00:44:29.130 [INFO][3993] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f" Namespace="calico-apiserver" Pod="calico-apiserver-5788cb8d6f-2k4jk" WorkloadEndpoint="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:29.144000 audit[4074]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:29.144000 audit[4074]: SYSCALL arch=c000003e syscall=46 success=yes exit=21536 a0=3 a1=7ffd0fea7bd0 a2=0 a3=7ffd0fea7bbc items=0 ppid=3239 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.144000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:29.157447 env[1200]: time="2025-05-13T00:44:29.157295494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:29.157615 env[1200]: time="2025-05-13T00:44:29.157345788Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:29.157615 env[1200]: time="2025-05-13T00:44:29.157357270Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:29.157747 env[1200]: time="2025-05-13T00:44:29.157594286Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f pid=4085 runtime=io.containerd.runc.v2 May 13 00:44:29.176586 systemd[1]: Started cri-containerd-056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f.scope. May 13 00:44:29.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit: BPF prog-id=185 op=LOAD May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4085 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035366138656634353236663038353262633764393038663835613564 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4085 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035366138656634353236663038353262633764393038663835613564 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.189000 audit: BPF prog-id=186 op=LOAD May 13 00:44:29.189000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099b00 items=0 ppid=4085 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035366138656634353236663038353262633764393038663835613564 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit: BPF prog-id=187 op=LOAD May 13 00:44:29.190000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099b48 items=0 ppid=4085 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035366138656634353236663038353262633764393038663835613564 May 13 00:44:29.190000 audit: BPF prog-id=187 op=UNLOAD May 13 00:44:29.190000 audit: BPF prog-id=186 op=UNLOAD May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.190000 audit: BPF prog-id=188 op=LOAD May 13 00:44:29.190000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099f58 items=0 ppid=4085 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035366138656634353236663038353262633764393038663835613564 May 13 00:44:29.192005 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:29.215110 kubelet[1940]: E0513 00:44:29.213562 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:29.219252 env[1200]: time="2025-05-13T00:44:29.219222116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5788cb8d6f-2k4jk,Uid:06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f\"" May 13 00:44:29.225573 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:44:29.225631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali815744f35b9: link becomes ready May 13 00:44:29.226236 systemd-networkd[1023]: cali815744f35b9: Link UP May 13 00:44:29.226369 systemd-networkd[1023]: cali815744f35b9: Gained carrier May 13 00:44:29.234500 kubelet[1940]: I0513 00:44:29.234232 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-qj2pp" podStartSLOduration=39.234212985 podStartE2EDuration="39.234212985s" podCreationTimestamp="2025-05-13 00:43:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:44:29.22730038 +0000 UTC m=+45.567742085" watchObservedRunningTime="2025-05-13 00:44:29.234212985 +0000 UTC m=+45.574654690" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.072 [INFO][4026] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0 calico-kube-controllers-56b77f9f65- calico-system 84a5dba7-4a32-4659-9ea5-03aaa37ba959 916 0 2025-05-13 00:43:56 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:56b77f9f65 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-56b77f9f65-gp9p9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali815744f35b9 [] []}} ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.073 [INFO][4026] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.107 [INFO][4056] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" HandleID="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.183 [INFO][4056] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" HandleID="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290d20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-56b77f9f65-gp9p9", "timestamp":"2025-05-13 00:44:29.107135014 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.183 [INFO][4056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.183 [INFO][4056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.183 [INFO][4056] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.185 [INFO][4056] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.188 [INFO][4056] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.194 [INFO][4056] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.195 [INFO][4056] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.197 [INFO][4056] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.197 [INFO][4056] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.199 [INFO][4056] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869 May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.202 [INFO][4056] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.215 [INFO][4056] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.215 [INFO][4056] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" host="localhost" May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.216 [INFO][4056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:29.236991 env[1200]: 2025-05-13 00:44:29.216 [INFO][4056] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" HandleID="k8s-pod-network.e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.222 [INFO][4026] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0", GenerateName:"calico-kube-controllers-56b77f9f65-", Namespace:"calico-system", SelfLink:"", UID:"84a5dba7-4a32-4659-9ea5-03aaa37ba959", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56b77f9f65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-56b77f9f65-gp9p9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali815744f35b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.222 [INFO][4026] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.222 [INFO][4026] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali815744f35b9 ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.225 [INFO][4026] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.225 [INFO][4026] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0", GenerateName:"calico-kube-controllers-56b77f9f65-", Namespace:"calico-system", SelfLink:"", UID:"84a5dba7-4a32-4659-9ea5-03aaa37ba959", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56b77f9f65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869", Pod:"calico-kube-controllers-56b77f9f65-gp9p9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali815744f35b9", MAC:"92:c3:80:10:d5:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:29.237493 env[1200]: 2025-05-13 00:44:29.234 [INFO][4026] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869" Namespace="calico-system" Pod="calico-kube-controllers-56b77f9f65-gp9p9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:29.242000 audit[4123]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.242000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe2f7e10b0 a2=0 a3=7ffe2f7e109c items=0 ppid=2086 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.251000 audit[4123]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.251000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe2f7e10b0 a2=0 a3=7ffe2f7e109c items=0 ppid=2086 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.255958 env[1200]: time="2025-05-13T00:44:29.255863904Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:29.256035 env[1200]: time="2025-05-13T00:44:29.255966566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:29.256035 env[1200]: time="2025-05-13T00:44:29.255990281Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:29.256205 env[1200]: time="2025-05-13T00:44:29.256164578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869 pid=4143 runtime=io.containerd.runc.v2 May 13 00:44:29.262000 audit[4153]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:29.262000 audit[4153]: SYSCALL arch=c000003e syscall=46 success=yes exit=21000 a0=3 a1=7ffc588566d0 a2=0 a3=7ffc588566bc items=0 ppid=3239 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.262000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:29.271000 audit[4165]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.271000 audit[4165]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc6c6f9fc0 a2=0 a3=7ffc6c6f9fac items=0 ppid=2086 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.275419 systemd[1]: Started cri-containerd-e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869.scope. May 13 00:44:29.281000 audit[4165]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.281000 audit[4165]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc6c6f9fc0 a2=0 a3=7ffc6c6f9fac items=0 ppid=2086 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.285000 audit: BPF prog-id=189 op=LOAD May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663766323135303638303965316233613537373135636266373930 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663766323135303638303965316233613537373135636266373930 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit: BPF prog-id=190 op=LOAD May 13 00:44:29.286000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000981d0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663766323135303638303965316233613537373135636266373930 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit: BPF prog-id=191 op=LOAD May 13 00:44:29.286000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098218 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663766323135303638303965316233613537373135636266373930 May 13 00:44:29.286000 audit: BPF prog-id=191 op=UNLOAD May 13 00:44:29.286000 audit: BPF prog-id=190 op=UNLOAD May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:29.286000 audit: BPF prog-id=192 op=LOAD May 13 00:44:29.286000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098628 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663766323135303638303965316233613537373135636266373930 May 13 00:44:29.287939 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:29.308523 env[1200]: time="2025-05-13T00:44:29.308482050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56b77f9f65-gp9p9,Uid:84a5dba7-4a32-4659-9ea5-03aaa37ba959,Namespace:calico-system,Attempt:1,} returns sandbox id \"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869\"" May 13 00:44:30.016927 systemd-networkd[1023]: cali7335791c02e: Gained IPv6LL May 13 00:44:30.017253 systemd-networkd[1023]: cali3e40258ddc1: Gained IPv6LL May 13 00:44:30.045516 env[1200]: time="2025-05-13T00:44:30.045459279Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:30.047420 env[1200]: time="2025-05-13T00:44:30.047378805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:30.048834 env[1200]: time="2025-05-13T00:44:30.048781238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:30.050237 env[1200]: time="2025-05-13T00:44:30.050199572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:30.050711 env[1200]: time="2025-05-13T00:44:30.050680185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:44:30.051631 env[1200]: time="2025-05-13T00:44:30.051607838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:44:30.052843 env[1200]: time="2025-05-13T00:44:30.052797693Z" level=info msg="CreateContainer within sandbox \"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:44:30.068571 env[1200]: time="2025-05-13T00:44:30.068516816Z" level=info msg="CreateContainer within sandbox \"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"05e9c384bc3554c53e3d5dfce0fbf8e042c51de2a22d469a4b977605b3fead2e\"" May 13 00:44:30.069108 env[1200]: time="2025-05-13T00:44:30.069066578Z" level=info msg="StartContainer for \"05e9c384bc3554c53e3d5dfce0fbf8e042c51de2a22d469a4b977605b3fead2e\"" May 13 00:44:30.091519 systemd[1]: run-containerd-runc-k8s.io-05e9c384bc3554c53e3d5dfce0fbf8e042c51de2a22d469a4b977605b3fead2e-runc.Z8zDN2.mount: Deactivated successfully. May 13 00:44:30.093263 systemd[1]: Started cri-containerd-05e9c384bc3554c53e3d5dfce0fbf8e042c51de2a22d469a4b977605b3fead2e.scope. May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.108452 kernel: kauditd_printk_skb: 1001 callbacks suppressed May 13 00:44:30.108527 kernel: audit: type=1400 audit(1747097070.106:1320): avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2dda1c02c8 items=0 ppid=3768 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653963333834626333353534633533653364356466636530666266 May 13 00:44:30.121095 kernel: audit: type=1300 audit(1747097070.106:1320): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2dda1c02c8 items=0 ppid=3768 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.121152 kernel: audit: type=1327 audit(1747097070.106:1320): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653963333834626333353534633533653364356466636530666266 May 13 00:44:30.121177 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.126930 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.130277 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.137211 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.137254 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.140164 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.143119 kernel: audit: type=1400 audit(1747097070.106:1321): avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.106000 audit: BPF prog-id=193 op=LOAD May 13 00:44:30.106000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=3768 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653963333834626333353534633533653364356466636530666266 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit: BPF prog-id=194 op=LOAD May 13 00:44:30.111000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=3768 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653963333834626333353534633533653364356466636530666266 May 13 00:44:30.111000 audit: BPF prog-id=194 op=UNLOAD May 13 00:44:30.111000 audit: BPF prog-id=193 op=UNLOAD May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:30.111000 audit: BPF prog-id=195 op=LOAD May 13 00:44:30.111000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=3768 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653963333834626333353534633533653364356466636530666266 May 13 00:44:30.175612 env[1200]: time="2025-05-13T00:44:30.175566829Z" level=info msg="StartContainer for \"05e9c384bc3554c53e3d5dfce0fbf8e042c51de2a22d469a4b977605b3fead2e\" returns successfully" May 13 00:44:30.218524 kubelet[1940]: E0513 00:44:30.218490 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:30.367050 kubelet[1940]: E0513 00:44:30.366995 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:30.592851 systemd-networkd[1023]: cali815744f35b9: Gained IPv6LL May 13 00:44:30.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.77:22-10.0.0.1:53842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.633196 systemd[1]: Started sshd@13-10.0.0.77:22-10.0.0.1:53842.service. May 13 00:44:30.676000 audit[4244]: USER_ACCT pid=4244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.677542 sshd[4244]: Accepted publickey for core from 10.0.0.1 port 53842 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:30.677000 audit[4244]: CRED_ACQ pid=4244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.677000 audit[4244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e320090 a2=3 a3=0 items=0 ppid=1 pid=4244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:30.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:30.678722 sshd[4244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:30.682082 systemd-logind[1190]: New session 14 of user core. May 13 00:44:30.683094 systemd[1]: Started session-14.scope. May 13 00:44:30.687000 audit[4244]: USER_START pid=4244 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.688000 audit[4246]: CRED_ACQ pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.792213 sshd[4244]: pam_unix(sshd:session): session closed for user core May 13 00:44:30.792000 audit[4244]: USER_END pid=4244 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.792000 audit[4244]: CRED_DISP pid=4244 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:30.795115 systemd[1]: sshd@13-10.0.0.77:22-10.0.0.1:53842.service: Deactivated successfully. May 13 00:44:30.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.77:22-10.0.0.1:53842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.795886 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:44:30.796354 systemd-logind[1190]: Session 14 logged out. Waiting for processes to exit. May 13 00:44:30.797172 systemd-logind[1190]: Removed session 14. May 13 00:44:30.848796 systemd-networkd[1023]: cali37dcd376c25: Gained IPv6LL May 13 00:44:30.912787 systemd-networkd[1023]: cali37df625bfbb: Gained IPv6LL May 13 00:44:31.220255 kubelet[1940]: E0513 00:44:31.220123 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:33.463209 env[1200]: time="2025-05-13T00:44:33.463120968Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.555380 env[1200]: time="2025-05-13T00:44:33.555304006Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.595869 env[1200]: time="2025-05-13T00:44:33.595783308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.692108 env[1200]: time="2025-05-13T00:44:33.692042321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.692793 env[1200]: time="2025-05-13T00:44:33.692759378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:44:33.693989 env[1200]: time="2025-05-13T00:44:33.693963017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:44:33.699189 env[1200]: time="2025-05-13T00:44:33.699123408Z" level=info msg="CreateContainer within sandbox \"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:44:33.826291 env[1200]: time="2025-05-13T00:44:33.826221210Z" level=info msg="CreateContainer within sandbox \"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e5a91b57929a43813c20e200e4600c45f66494e026652360e6436c4d995aaa2a\"" May 13 00:44:33.826940 env[1200]: time="2025-05-13T00:44:33.826898611Z" level=info msg="StartContainer for \"e5a91b57929a43813c20e200e4600c45f66494e026652360e6436c4d995aaa2a\"" May 13 00:44:33.845617 systemd[1]: Started cri-containerd-e5a91b57929a43813c20e200e4600c45f66494e026652360e6436c4d995aaa2a.scope. May 13 00:44:33.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.861000 audit: BPF prog-id=196 op=LOAD May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3943 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613931623537393239613433383133633230653230306534363030 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3943 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613931623537393239613433383133633230653230306534363030 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit: BPF prog-id=197 op=LOAD May 13 00:44:33.862000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000346010 items=0 ppid=3943 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613931623537393239613433383133633230653230306534363030 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit: BPF prog-id=198 op=LOAD May 13 00:44:33.862000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000346058 items=0 ppid=3943 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613931623537393239613433383133633230653230306534363030 May 13 00:44:33.862000 audit: BPF prog-id=198 op=UNLOAD May 13 00:44:33.862000 audit: BPF prog-id=197 op=UNLOAD May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.862000 audit: BPF prog-id=199 op=LOAD May 13 00:44:33.862000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000346468 items=0 ppid=3943 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613931623537393239613433383133633230653230306534363030 May 13 00:44:34.724133 env[1200]: time="2025-05-13T00:44:34.724061309Z" level=info msg="StartContainer for \"e5a91b57929a43813c20e200e4600c45f66494e026652360e6436c4d995aaa2a\" returns successfully" May 13 00:44:35.029000 audit[4300]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.029000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffc3113be0 a2=0 a3=7fffc3113bcc items=0 ppid=2086 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.033000 audit[4300]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.033000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffc3113be0 a2=0 a3=7fffc3113bcc items=0 ppid=2086 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.390616 env[1200]: time="2025-05-13T00:44:35.390566042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:35.394140 env[1200]: time="2025-05-13T00:44:35.394090109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:35.396156 env[1200]: time="2025-05-13T00:44:35.396107917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:35.398400 env[1200]: time="2025-05-13T00:44:35.398368331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:35.398625 env[1200]: time="2025-05-13T00:44:35.398587943Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:44:35.400644 env[1200]: time="2025-05-13T00:44:35.400615901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:44:35.401939 env[1200]: time="2025-05-13T00:44:35.401873703Z" level=info msg="CreateContainer within sandbox \"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:44:35.418759 env[1200]: time="2025-05-13T00:44:35.418647846Z" level=info msg="CreateContainer within sandbox \"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"343b87063b2c44af49c240e89db7841ad3c136cca8d453b21997db8c82a79928\"" May 13 00:44:35.419631 env[1200]: time="2025-05-13T00:44:35.419603060Z" level=info msg="StartContainer for \"343b87063b2c44af49c240e89db7841ad3c136cca8d453b21997db8c82a79928\"" May 13 00:44:35.443228 systemd[1]: Started cri-containerd-343b87063b2c44af49c240e89db7841ad3c136cca8d453b21997db8c82a79928.scope. May 13 00:44:35.467208 kernel: kauditd_printk_skb: 107 callbacks suppressed May 13 00:44:35.467364 kernel: audit: type=1400 audit(1747097075.459:1355): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.467404 kernel: audit: type=1400 audit(1747097075.459:1356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.470759 kernel: audit: type=1400 audit(1747097075.459:1357): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.473976 kernel: audit: type=1400 audit(1747097075.459:1358): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.477131 kernel: audit: type=1400 audit(1747097075.459:1359): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.480352 kernel: audit: type=1400 audit(1747097075.459:1360): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.483607 kernel: audit: type=1400 audit(1747097075.459:1361): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.490869 kernel: audit: type=1400 audit(1747097075.459:1362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.490919 kernel: audit: type=1400 audit(1747097075.459:1363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.494226 kernel: audit: type=1400 audit(1747097075.463:1364): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.463000 audit: BPF prog-id=200 op=LOAD May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4085 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334336238373036336232633434616634396332343065383964623738 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4085 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334336238373036336232633434616634396332343065383964623738 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.464000 audit: BPF prog-id=201 op=LOAD May 13 00:44:35.464000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000295170 items=0 ppid=4085 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334336238373036336232633434616634396332343065383964623738 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit: BPF prog-id=202 op=LOAD May 13 00:44:35.466000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002951b8 items=0 ppid=4085 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334336238373036336232633434616634396332343065383964623738 May 13 00:44:35.466000 audit: BPF prog-id=202 op=UNLOAD May 13 00:44:35.466000 audit: BPF prog-id=201 op=UNLOAD May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:35.466000 audit: BPF prog-id=203 op=LOAD May 13 00:44:35.466000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002955c8 items=0 ppid=4085 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334336238373036336232633434616634396332343065383964623738 May 13 00:44:35.518085 env[1200]: time="2025-05-13T00:44:35.518010973Z" level=info msg="StartContainer for \"343b87063b2c44af49c240e89db7841ad3c136cca8d453b21997db8c82a79928\" returns successfully" May 13 00:44:35.731114 kubelet[1940]: I0513 00:44:35.730965 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:44:35.736000 audit[4274]: AVC avc: denied { watch } for pid=4274 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_44_13.3470042066/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c469,c946 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c469,c946 tclass=file permissive=0 May 13 00:44:35.736000 audit[4274]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00062d5a0 a2=fc6 a3=0 items=0 ppid=3943 pid=4274 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c469,c946 key=(null) May 13 00:44:35.736000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:44:35.778228 kubelet[1940]: I0513 00:44:35.778172 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5788cb8d6f-nkqhh" podStartSLOduration=35.152825595 podStartE2EDuration="39.778151865s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:44:29.068471017 +0000 UTC m=+45.408912712" lastFinishedPulling="2025-05-13 00:44:33.693797277 +0000 UTC m=+50.034238982" observedRunningTime="2025-05-13 00:44:34.985345588 +0000 UTC m=+51.325787293" watchObservedRunningTime="2025-05-13 00:44:35.778151865 +0000 UTC m=+52.118593570" May 13 00:44:35.789000 audit[4348]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.789000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff900795b0 a2=0 a3=7fff9007959c items=0 ppid=2086 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.793000 audit[4348]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.793000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff900795b0 a2=0 a3=7fff9007959c items=0 ppid=2086 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.77:22-10.0.0.1:35454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:35.797314 systemd[1]: Started sshd@14-10.0.0.77:22-10.0.0.1:35454.service. May 13 00:44:35.841000 audit[4350]: USER_ACCT pid=4350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.841997 sshd[4350]: Accepted publickey for core from 10.0.0.1 port 35454 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:35.841000 audit[4350]: CRED_ACQ pid=4350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.841000 audit[4350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbf941a10 a2=3 a3=0 items=0 ppid=1 pid=4350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:35.843023 sshd[4350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:35.846447 systemd-logind[1190]: New session 15 of user core. May 13 00:44:35.847247 systemd[1]: Started session-15.scope. May 13 00:44:35.850000 audit[4350]: USER_START pid=4350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.851000 audit[4352]: CRED_ACQ pid=4352 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.966744 sshd[4350]: pam_unix(sshd:session): session closed for user core May 13 00:44:35.967000 audit[4350]: USER_END pid=4350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.967000 audit[4350]: CRED_DISP pid=4350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:35.969585 systemd[1]: sshd@14-10.0.0.77:22-10.0.0.1:35454.service: Deactivated successfully. May 13 00:44:35.970460 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:44:35.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.77:22-10.0.0.1:35454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:35.971032 systemd-logind[1190]: Session 15 logged out. Waiting for processes to exit. May 13 00:44:35.971830 systemd-logind[1190]: Removed session 15. May 13 00:44:36.296000 audit[4326]: AVC avc: denied { watch } for pid=4326 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_44_13.17570120/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c459,c481 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c459,c481 tclass=file permissive=0 May 13 00:44:36.296000 audit[4326]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ec2020 a2=fc6 a3=0 items=0 ppid=4085 pid=4326 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c459,c481 key=(null) May 13 00:44:36.296000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:44:36.315109 kubelet[1940]: I0513 00:44:36.315023 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5788cb8d6f-2k4jk" podStartSLOduration=34.135375463 podStartE2EDuration="40.315000526s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:44:29.220324577 +0000 UTC m=+45.560766282" lastFinishedPulling="2025-05-13 00:44:35.39994964 +0000 UTC m=+51.740391345" observedRunningTime="2025-05-13 00:44:35.778603663 +0000 UTC m=+52.119045368" watchObservedRunningTime="2025-05-13 00:44:36.315000526 +0000 UTC m=+52.655442221" May 13 00:44:36.325000 audit[4364]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:36.325000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffeb63b8eb0 a2=0 a3=7ffeb63b8e9c items=0 ppid=2086 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:36.338000 audit[4364]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:36.338000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffeb63b8eb0 a2=0 a3=7ffeb63b8e9c items=0 ppid=2086 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:36.871226 kubelet[1940]: I0513 00:44:36.871181 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:44:37.376000 audit[4366]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:37.376000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb2ceca90 a2=0 a3=7fffb2ceca7c items=0 ppid=2086 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:37.386000 audit[4366]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:37.386000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffb2ceca90 a2=0 a3=7fffb2ceca7c items=0 ppid=2086 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:37.788973 env[1200]: time="2025-05-13T00:44:37.788832415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:37.790805 env[1200]: time="2025-05-13T00:44:37.790766586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:37.792243 env[1200]: time="2025-05-13T00:44:37.792216408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:37.793462 env[1200]: time="2025-05-13T00:44:37.793436769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:37.793841 env[1200]: time="2025-05-13T00:44:37.793818886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 00:44:37.794847 env[1200]: time="2025-05-13T00:44:37.794809235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:44:37.807322 env[1200]: time="2025-05-13T00:44:37.807281369Z" level=info msg="CreateContainer within sandbox \"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:44:37.820929 env[1200]: time="2025-05-13T00:44:37.820899335Z" level=info msg="CreateContainer within sandbox \"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9d6e3a28f40d088617cf9dda7f50bbc0a2c4d2f4d9c79d91e7e4daf258e1aff1\"" May 13 00:44:37.821556 env[1200]: time="2025-05-13T00:44:37.821523847Z" level=info msg="StartContainer for \"9d6e3a28f40d088617cf9dda7f50bbc0a2c4d2f4d9c79d91e7e4daf258e1aff1\"" May 13 00:44:37.837342 systemd[1]: Started cri-containerd-9d6e3a28f40d088617cf9dda7f50bbc0a2c4d2f4d9c79d91e7e4daf258e1aff1.scope. May 13 00:44:37.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit: BPF prog-id=204 op=LOAD May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4143 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366533613238663430643038383631376366396464613766353062 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4143 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366533613238663430643038383631376366396464613766353062 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit: BPF prog-id=205 op=LOAD May 13 00:44:37.850000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003dcb70 items=0 ppid=4143 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366533613238663430643038383631376366396464613766353062 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit: BPF prog-id=206 op=LOAD May 13 00:44:37.850000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003dcbb8 items=0 ppid=4143 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366533613238663430643038383631376366396464613766353062 May 13 00:44:37.850000 audit: BPF prog-id=206 op=UNLOAD May 13 00:44:37.850000 audit: BPF prog-id=205 op=UNLOAD May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.850000 audit: BPF prog-id=207 op=LOAD May 13 00:44:37.850000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003dcfc8 items=0 ppid=4143 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366533613238663430643038383631376366396464613766353062 May 13 00:44:38.801820 env[1200]: time="2025-05-13T00:44:38.801689209Z" level=info msg="StartContainer for \"9d6e3a28f40d088617cf9dda7f50bbc0a2c4d2f4d9c79d91e7e4daf258e1aff1\" returns successfully" May 13 00:44:39.824803 systemd[1]: run-containerd-runc-k8s.io-9d6e3a28f40d088617cf9dda7f50bbc0a2c4d2f4d9c79d91e7e4daf258e1aff1-runc.Na6znN.mount: Deactivated successfully. May 13 00:44:39.874220 kubelet[1940]: I0513 00:44:39.874166 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-56b77f9f65-gp9p9" podStartSLOduration=35.389228896 podStartE2EDuration="43.874150561s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:44:29.309697614 +0000 UTC m=+45.650139319" lastFinishedPulling="2025-05-13 00:44:37.794619279 +0000 UTC m=+54.135060984" observedRunningTime="2025-05-13 00:44:39.873907815 +0000 UTC m=+56.214349520" watchObservedRunningTime="2025-05-13 00:44:39.874150561 +0000 UTC m=+56.214592266" May 13 00:44:40.394000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.394000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f8f7c0 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:40.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:40.395000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.395000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002963260 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:40.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:40.758330 kernel: kauditd_printk_skb: 145 callbacks suppressed May 13 00:44:40.758495 kernel: audit: type=1400 audit(1747097080.748:1410): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.758526 kernel: audit: type=1400 audit(1747097080.748:1411): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.748000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.748000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.748000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.748000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00ede2b60 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.768100 kernel: audit: type=1400 audit(1747097080.748:1412): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.768157 kernel: audit: type=1300 audit(1747097080.748:1412): arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00ede2b60 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.768178 kernel: audit: type=1327 audit(1747097080.748:1412): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00ced66c0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.777279 kernel: audit: type=1300 audit(1747097080.748:1410): arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00ced66c0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.777333 kernel: audit: type=1327 audit(1747097080.748:1410): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.802463 kernel: audit: type=1400 audit(1747097080.748:1413): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.802554 kernel: audit: type=1300 audit(1747097080.748:1413): arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00d47dbc0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.748000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00d47dbc0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.807227 kernel: audit: type=1327 audit(1747097080.748:1413): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.749000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.749000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f4647a0 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.749000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.749000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:40.749000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00ced6840 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.749000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.748000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00d8d2240 a2=fc6 a3=0 items=0 ppid=1659 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c971 key=(null) May 13 00:44:40.748000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:44:40.875970 env[1200]: time="2025-05-13T00:44:40.875894102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:40.879299 env[1200]: time="2025-05-13T00:44:40.879256633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:40.881874 env[1200]: time="2025-05-13T00:44:40.881834903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:40.884478 env[1200]: time="2025-05-13T00:44:40.884435104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:40.885048 env[1200]: time="2025-05-13T00:44:40.884970729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:44:40.887385 env[1200]: time="2025-05-13T00:44:40.887347140Z" level=info msg="CreateContainer within sandbox \"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:44:40.904727 env[1200]: time="2025-05-13T00:44:40.904654235Z" level=info msg="CreateContainer within sandbox \"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c3755f55294310a9b71f199014bc9588cfc2b89790c6422b4338066f74a8a776\"" May 13 00:44:40.905515 env[1200]: time="2025-05-13T00:44:40.905481949Z" level=info msg="StartContainer for \"c3755f55294310a9b71f199014bc9588cfc2b89790c6422b4338066f74a8a776\"" May 13 00:44:40.933283 systemd[1]: Started cri-containerd-c3755f55294310a9b71f199014bc9588cfc2b89790c6422b4338066f74a8a776.scope. May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f3f9f2cde18 items=0 ppid=3768 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:40.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333373535663535323934333130613962373166313939303134626339 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit: BPF prog-id=208 op=LOAD May 13 00:44:40.947000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000986f8 items=0 ppid=3768 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:40.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333373535663535323934333130613962373166313939303134626339 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.947000 audit: BPF prog-id=209 op=LOAD May 13 00:44:40.947000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c000098748 items=0 ppid=3768 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:40.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333373535663535323934333130613962373166313939303134626339 May 13 00:44:40.947000 audit: BPF prog-id=209 op=UNLOAD May 13 00:44:40.948000 audit: BPF prog-id=208 op=UNLOAD May 13 00:44:40.948000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:40.948000 audit: BPF prog-id=210 op=LOAD May 13 00:44:40.948000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000987d8 items=0 ppid=3768 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:40.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333373535663535323934333130613962373166313939303134626339 May 13 00:44:40.966166 env[1200]: time="2025-05-13T00:44:40.966117834Z" level=info msg="StartContainer for \"c3755f55294310a9b71f199014bc9588cfc2b89790c6422b4338066f74a8a776\" returns successfully" May 13 00:44:40.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.77:22-10.0.0.1:35468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:40.971468 systemd[1]: Started sshd@15-10.0.0.77:22-10.0.0.1:35468.service. May 13 00:44:41.018447 sshd[4469]: Accepted publickey for core from 10.0.0.1 port 35468 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:41.017000 audit[4469]: USER_ACCT pid=4469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.018000 audit[4469]: CRED_ACQ pid=4469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.018000 audit[4469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca0a313e0 a2=3 a3=0 items=0 ppid=1 pid=4469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:41.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:41.019984 sshd[4469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.024908 systemd[1]: Started session-16.scope. May 13 00:44:41.025450 systemd-logind[1190]: New session 16 of user core. May 13 00:44:41.030000 audit[4469]: USER_START pid=4469 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.031000 audit[4473]: CRED_ACQ pid=4473 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.200312 sshd[4469]: pam_unix(sshd:session): session closed for user core May 13 00:44:41.201000 audit[4469]: USER_END pid=4469 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.201000 audit[4469]: CRED_DISP pid=4469 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:41.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.77:22-10.0.0.1:35468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:41.203071 systemd[1]: sshd@15-10.0.0.77:22-10.0.0.1:35468.service: Deactivated successfully. May 13 00:44:41.203842 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:44:41.204692 systemd-logind[1190]: Session 16 logged out. Waiting for processes to exit. May 13 00:44:41.205432 systemd-logind[1190]: Removed session 16. May 13 00:44:41.813186 kubelet[1940]: I0513 00:44:41.813145 1940 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:44:41.813744 kubelet[1940]: I0513 00:44:41.813703 1940 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:44:41.824526 kubelet[1940]: I0513 00:44:41.824474 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7z6bj" podStartSLOduration=33.2210555 podStartE2EDuration="45.82445582s" podCreationTimestamp="2025-05-13 00:43:56 +0000 UTC" firstStartedPulling="2025-05-13 00:44:28.282659213 +0000 UTC m=+44.623100918" lastFinishedPulling="2025-05-13 00:44:40.886059533 +0000 UTC m=+57.226501238" observedRunningTime="2025-05-13 00:44:41.823841266 +0000 UTC m=+58.164282971" watchObservedRunningTime="2025-05-13 00:44:41.82445582 +0000 UTC m=+58.164897525" May 13 00:44:43.721845 env[1200]: time="2025-05-13T00:44:43.721802372Z" level=info msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.753 [WARNING][4500] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0", GenerateName:"calico-kube-controllers-56b77f9f65-", Namespace:"calico-system", SelfLink:"", UID:"84a5dba7-4a32-4659-9ea5-03aaa37ba959", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56b77f9f65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869", Pod:"calico-kube-controllers-56b77f9f65-gp9p9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali815744f35b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.753 [INFO][4500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.753 [INFO][4500] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" iface="eth0" netns="" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.753 [INFO][4500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.753 [INFO][4500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.769 [INFO][4512] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.769 [INFO][4512] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.769 [INFO][4512] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.774 [WARNING][4512] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.775 [INFO][4512] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.776 [INFO][4512] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:43.780632 env[1200]: 2025-05-13 00:44:43.778 [INFO][4500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.781179 env[1200]: time="2025-05-13T00:44:43.780677228Z" level=info msg="TearDown network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" successfully" May 13 00:44:43.781179 env[1200]: time="2025-05-13T00:44:43.780718625Z" level=info msg="StopPodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" returns successfully" May 13 00:44:43.781319 env[1200]: time="2025-05-13T00:44:43.781290017Z" level=info msg="RemovePodSandbox for \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" May 13 00:44:43.781396 env[1200]: time="2025-05-13T00:44:43.781322168Z" level=info msg="Forcibly stopping sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\"" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.816 [WARNING][4535] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0", GenerateName:"calico-kube-controllers-56b77f9f65-", Namespace:"calico-system", SelfLink:"", UID:"84a5dba7-4a32-4659-9ea5-03aaa37ba959", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56b77f9f65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e5f7f21506809e1b3a57715cbf790d95110e02bd26d7bcbe73ecbad59f09c869", Pod:"calico-kube-controllers-56b77f9f65-gp9p9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali815744f35b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.817 [INFO][4535] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.817 [INFO][4535] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" iface="eth0" netns="" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.817 [INFO][4535] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.817 [INFO][4535] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.842 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.842 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.842 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.848 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.848 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" HandleID="k8s-pod-network.61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" Workload="localhost-k8s-calico--kube--controllers--56b77f9f65--gp9p9-eth0" May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.849 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:43.853060 env[1200]: 2025-05-13 00:44:43.851 [INFO][4535] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137" May 13 00:44:43.853623 env[1200]: time="2025-05-13T00:44:43.853092025Z" level=info msg="TearDown network for sandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" successfully" May 13 00:44:44.002036 env[1200]: time="2025-05-13T00:44:44.001900879Z" level=info msg="RemovePodSandbox \"61449181f5ed6df38cd8c7f83d519ac3b053765df48ecdf3fc133e6463d66137\" returns successfully" May 13 00:44:44.002580 env[1200]: time="2025-05-13T00:44:44.002555778Z" level=info msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.032 [WARNING][4567] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z6bj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94dec563-a208-445d-befe-67b1bf96f70e", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf", Pod:"csi-node-driver-7z6bj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7335791c02e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.032 [INFO][4567] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.032 [INFO][4567] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" iface="eth0" netns="" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.032 [INFO][4567] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.032 [INFO][4567] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.049 [INFO][4575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.049 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.049 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.054 [WARNING][4575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.054 [INFO][4575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.056 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.058545 env[1200]: 2025-05-13 00:44:44.057 [INFO][4567] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.059168 env[1200]: time="2025-05-13T00:44:44.058578688Z" level=info msg="TearDown network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" successfully" May 13 00:44:44.059168 env[1200]: time="2025-05-13T00:44:44.058611259Z" level=info msg="StopPodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" returns successfully" May 13 00:44:44.059256 env[1200]: time="2025-05-13T00:44:44.059209110Z" level=info msg="RemovePodSandbox for \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" May 13 00:44:44.059307 env[1200]: time="2025-05-13T00:44:44.059264494Z" level=info msg="Forcibly stopping sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\"" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.091 [WARNING][4599] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z6bj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94dec563-a208-445d-befe-67b1bf96f70e", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53f0154653d376a71dd9e149704d7e24a16c6823f9c45d97bad7cad9b3a55daf", Pod:"csi-node-driver-7z6bj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7335791c02e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.092 [INFO][4599] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.092 [INFO][4599] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" iface="eth0" netns="" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.092 [INFO][4599] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.092 [INFO][4599] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.111 [INFO][4607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.112 [INFO][4607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.112 [INFO][4607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.117 [WARNING][4607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.117 [INFO][4607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" HandleID="k8s-pod-network.5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" Workload="localhost-k8s-csi--node--driver--7z6bj-eth0" May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.118 [INFO][4607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.121410 env[1200]: 2025-05-13 00:44:44.120 [INFO][4599] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd" May 13 00:44:44.121920 env[1200]: time="2025-05-13T00:44:44.121444180Z" level=info msg="TearDown network for sandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" successfully" May 13 00:44:44.200209 env[1200]: time="2025-05-13T00:44:44.200169015Z" level=info msg="RemovePodSandbox \"5d25ee35c232e222cd1da6fc4d5bde602daab8c0b98b443ac11bc6f9db421ebd\" returns successfully" May 13 00:44:44.200703 env[1200]: time="2025-05-13T00:44:44.200656509Z" level=info msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.230 [WARNING][4632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"95580b76-e3ba-4eba-806a-3c305729ce2e", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240", Pod:"coredns-6f6b679f8f-vzrrl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic507de938df", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.231 [INFO][4632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.231 [INFO][4632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" iface="eth0" netns="" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.231 [INFO][4632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.231 [INFO][4632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.248 [INFO][4640] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.249 [INFO][4640] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.249 [INFO][4640] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.254 [WARNING][4640] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.254 [INFO][4640] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.255 [INFO][4640] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.258096 env[1200]: 2025-05-13 00:44:44.256 [INFO][4632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.258096 env[1200]: time="2025-05-13T00:44:44.258061232Z" level=info msg="TearDown network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" successfully" May 13 00:44:44.258096 env[1200]: time="2025-05-13T00:44:44.258097149Z" level=info msg="StopPodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" returns successfully" May 13 00:44:44.258729 env[1200]: time="2025-05-13T00:44:44.258698378Z" level=info msg="RemovePodSandbox for \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" May 13 00:44:44.258772 env[1200]: time="2025-05-13T00:44:44.258732742Z" level=info msg="Forcibly stopping sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\"" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.289 [WARNING][4663] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"95580b76-e3ba-4eba-806a-3c305729ce2e", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b19a773095d3894163e969f374483852c8920f42471cff6072d784f4bc897240", Pod:"coredns-6f6b679f8f-vzrrl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic507de938df", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.289 [INFO][4663] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.289 [INFO][4663] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" iface="eth0" netns="" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.289 [INFO][4663] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.289 [INFO][4663] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.309 [INFO][4671] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.309 [INFO][4671] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.309 [INFO][4671] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.314 [WARNING][4671] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.314 [INFO][4671] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" HandleID="k8s-pod-network.0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" Workload="localhost-k8s-coredns--6f6b679f8f--vzrrl-eth0" May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.315 [INFO][4671] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.318648 env[1200]: 2025-05-13 00:44:44.317 [INFO][4663] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae" May 13 00:44:44.319115 env[1200]: time="2025-05-13T00:44:44.318660315Z" level=info msg="TearDown network for sandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" successfully" May 13 00:44:44.444738 env[1200]: time="2025-05-13T00:44:44.444678653Z" level=info msg="RemovePodSandbox \"0fbf8dcebbecd2478263bf9ad1ff3a417ed3bce3c244d7134fbe7cce2641b1ae\" returns successfully" May 13 00:44:44.445346 env[1200]: time="2025-05-13T00:44:44.445300885Z" level=info msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.479 [WARNING][4693] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f", Pod:"calico-apiserver-5788cb8d6f-2k4jk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37df625bfbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.479 [INFO][4693] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.479 [INFO][4693] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" iface="eth0" netns="" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.479 [INFO][4693] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.479 [INFO][4693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.506 [INFO][4701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.506 [INFO][4701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.506 [INFO][4701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.511 [WARNING][4701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.511 [INFO][4701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.513 [INFO][4701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.516823 env[1200]: 2025-05-13 00:44:44.515 [INFO][4693] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.516823 env[1200]: time="2025-05-13T00:44:44.516729694Z" level=info msg="TearDown network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" successfully" May 13 00:44:44.516823 env[1200]: time="2025-05-13T00:44:44.516775680Z" level=info msg="StopPodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" returns successfully" May 13 00:44:44.517817 env[1200]: time="2025-05-13T00:44:44.517366433Z" level=info msg="RemovePodSandbox for \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" May 13 00:44:44.517817 env[1200]: time="2025-05-13T00:44:44.517405968Z" level=info msg="Forcibly stopping sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\"" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.550 [WARNING][4723] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"06a0a1c9-9b4a-4a71-9eb2-846d9b632bc6", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"056a8ef4526f0852bc7d908f85a5d1dbf500737f2ee120d8a2724d925041705f", Pod:"calico-apiserver-5788cb8d6f-2k4jk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37df625bfbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.551 [INFO][4723] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.551 [INFO][4723] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" iface="eth0" netns="" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.551 [INFO][4723] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.551 [INFO][4723] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.570 [INFO][4731] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.570 [INFO][4731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.570 [INFO][4731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.575 [WARNING][4731] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.575 [INFO][4731] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" HandleID="k8s-pod-network.8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--2k4jk-eth0" May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.577 [INFO][4731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.581590 env[1200]: 2025-05-13 00:44:44.579 [INFO][4723] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e" May 13 00:44:44.582314 env[1200]: time="2025-05-13T00:44:44.581608490Z" level=info msg="TearDown network for sandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" successfully" May 13 00:44:44.584746 env[1200]: time="2025-05-13T00:44:44.584707830Z" level=info msg="RemovePodSandbox \"8ab9a204d4ef6fb020fee1fd26d59cca1187fc5bc4ee297c98c816c7361ccc0e\" returns successfully" May 13 00:44:44.585225 env[1200]: time="2025-05-13T00:44:44.585188716Z" level=info msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.618 [WARNING][4754] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"bde478f5-ae94-4d57-9ddf-f410173484ec", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064", Pod:"calico-apiserver-5788cb8d6f-nkqhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37dcd376c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.618 [INFO][4754] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.618 [INFO][4754] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" iface="eth0" netns="" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.618 [INFO][4754] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.618 [INFO][4754] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.644 [INFO][4762] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.644 [INFO][4762] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.644 [INFO][4762] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.651 [WARNING][4762] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.651 [INFO][4762] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.652 [INFO][4762] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.655974 env[1200]: 2025-05-13 00:44:44.654 [INFO][4754] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.656517 env[1200]: time="2025-05-13T00:44:44.655996334Z" level=info msg="TearDown network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" successfully" May 13 00:44:44.656517 env[1200]: time="2025-05-13T00:44:44.656028234Z" level=info msg="StopPodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" returns successfully" May 13 00:44:44.656569 env[1200]: time="2025-05-13T00:44:44.656521874Z" level=info msg="RemovePodSandbox for \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" May 13 00:44:44.656569 env[1200]: time="2025-05-13T00:44:44.656545168Z" level=info msg="Forcibly stopping sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\"" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.688 [WARNING][4784] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0", GenerateName:"calico-apiserver-5788cb8d6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"bde478f5-ae94-4d57-9ddf-f410173484ec", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5788cb8d6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36af052464ec21a6e8fc96a7da637ffdb891b4e0fd0f3964bd172973de849064", Pod:"calico-apiserver-5788cb8d6f-nkqhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali37dcd376c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.688 [INFO][4784] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.688 [INFO][4784] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" iface="eth0" netns="" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.688 [INFO][4784] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.688 [INFO][4784] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.707 [INFO][4793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.707 [INFO][4793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.707 [INFO][4793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.713 [WARNING][4793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.713 [INFO][4793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" HandleID="k8s-pod-network.34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" Workload="localhost-k8s-calico--apiserver--5788cb8d6f--nkqhh-eth0" May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.714 [INFO][4793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.717461 env[1200]: 2025-05-13 00:44:44.716 [INFO][4784] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5" May 13 00:44:44.717964 env[1200]: time="2025-05-13T00:44:44.717494491Z" level=info msg="TearDown network for sandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" successfully" May 13 00:44:44.721269 env[1200]: time="2025-05-13T00:44:44.721237704Z" level=info msg="RemovePodSandbox \"34f368f475b7b9e34c1a970f053e284bafdfd7d085ebc4b71d30545ac10ea2e5\" returns successfully" May 13 00:44:44.721789 env[1200]: time="2025-05-13T00:44:44.721765999Z" level=info msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.754 [WARNING][4816] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"116e3f47-4636-4f9e-a1ad-d8e834632cbf", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a", Pod:"coredns-6f6b679f8f-qj2pp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e40258ddc1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.754 [INFO][4816] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.754 [INFO][4816] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" iface="eth0" netns="" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.754 [INFO][4816] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.754 [INFO][4816] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.779 [INFO][4824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.779 [INFO][4824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.779 [INFO][4824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.785 [WARNING][4824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.785 [INFO][4824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.787 [INFO][4824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.790649 env[1200]: 2025-05-13 00:44:44.788 [INFO][4816] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.790649 env[1200]: time="2025-05-13T00:44:44.790588536Z" level=info msg="TearDown network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" successfully" May 13 00:44:44.790649 env[1200]: time="2025-05-13T00:44:44.790618924Z" level=info msg="StopPodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" returns successfully" May 13 00:44:44.791900 env[1200]: time="2025-05-13T00:44:44.791147149Z" level=info msg="RemovePodSandbox for \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" May 13 00:44:44.791900 env[1200]: time="2025-05-13T00:44:44.791183868Z" level=info msg="Forcibly stopping sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\"" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.824 [WARNING][4846] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"116e3f47-4636-4f9e-a1ad-d8e834632cbf", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f066a1d52747684a56c5766af5d0ff0000de78c9d92475a222979c6bd41d476a", Pod:"coredns-6f6b679f8f-qj2pp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e40258ddc1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.825 [INFO][4846] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.825 [INFO][4846] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" iface="eth0" netns="" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.825 [INFO][4846] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.825 [INFO][4846] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.846 [INFO][4854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.846 [INFO][4854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.846 [INFO][4854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.851 [WARNING][4854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.851 [INFO][4854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" HandleID="k8s-pod-network.61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" Workload="localhost-k8s-coredns--6f6b679f8f--qj2pp-eth0" May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.852 [INFO][4854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:44.855878 env[1200]: 2025-05-13 00:44:44.854 [INFO][4846] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b" May 13 00:44:44.856392 env[1200]: time="2025-05-13T00:44:44.855908715Z" level=info msg="TearDown network for sandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" successfully" May 13 00:44:44.859207 env[1200]: time="2025-05-13T00:44:44.859180529Z" level=info msg="RemovePodSandbox \"61d143eb80df77f1c3ce277742318482b8c403f129fe57a7ef58c00af943386b\" returns successfully" May 13 00:44:46.205835 systemd[1]: Started sshd@16-10.0.0.77:22-10.0.0.1:38488.service. May 13 00:44:46.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.77:22-10.0.0.1:38488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.207321 kernel: kauditd_printk_skb: 62 callbacks suppressed May 13 00:44:46.207464 kernel: audit: type=1130 audit(1747097086.204:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.77:22-10.0.0.1:38488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.249000 audit[4868]: USER_ACCT pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.251240 sshd[4868]: Accepted publickey for core from 10.0.0.1 port 38488 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:46.253399 sshd[4868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:46.251000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.257039 systemd-logind[1190]: New session 17 of user core. May 13 00:44:46.258074 systemd[1]: Started session-17.scope. May 13 00:44:46.258683 kernel: audit: type=1101 audit(1747097086.249:1432): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.258734 kernel: audit: type=1103 audit(1747097086.251:1433): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.258751 kernel: audit: type=1006 audit(1747097086.251:1434): pid=4868 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 00:44:46.251000 audit[4868]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25e9b0d0 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.264981 kernel: audit: type=1300 audit(1747097086.251:1434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25e9b0d0 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.265025 kernel: audit: type=1327 audit(1747097086.251:1434): proctitle=737368643A20636F7265205B707269765D May 13 00:44:46.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:46.266314 kernel: audit: type=1105 audit(1747097086.260:1435): pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.260000 audit[4868]: USER_START pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.261000 audit[4870]: CRED_ACQ pid=4870 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.274030 kernel: audit: type=1103 audit(1747097086.261:1436): pid=4870 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.380944 sshd[4868]: pam_unix(sshd:session): session closed for user core May 13 00:44:46.380000 audit[4868]: USER_END pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.383926 systemd[1]: sshd@16-10.0.0.77:22-10.0.0.1:38488.service: Deactivated successfully. May 13 00:44:46.384447 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:44:46.385013 systemd-logind[1190]: Session 17 logged out. Waiting for processes to exit. May 13 00:44:46.380000 audit[4868]: CRED_DISP pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.386732 systemd[1]: Started sshd@17-10.0.0.77:22-10.0.0.1:38498.service. May 13 00:44:46.387585 systemd-logind[1190]: Removed session 17. May 13 00:44:46.389775 kernel: audit: type=1106 audit(1747097086.380:1437): pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.389823 kernel: audit: type=1104 audit(1747097086.380:1438): pid=4868 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.77:22-10.0.0.1:38488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.77:22-10.0.0.1:38498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.425000 audit[4881]: USER_ACCT pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.427484 sshd[4881]: Accepted publickey for core from 10.0.0.1 port 38498 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:46.426000 audit[4881]: CRED_ACQ pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.426000 audit[4881]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccfe57d60 a2=3 a3=0 items=0 ppid=1 pid=4881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:46.428409 sshd[4881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:46.431731 systemd-logind[1190]: New session 18 of user core. May 13 00:44:46.432582 systemd[1]: Started session-18.scope. May 13 00:44:46.435000 audit[4881]: USER_START pid=4881 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.436000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.639114 sshd[4881]: pam_unix(sshd:session): session closed for user core May 13 00:44:46.638000 audit[4881]: USER_END pid=4881 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.638000 audit[4881]: CRED_DISP pid=4881 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.642181 systemd[1]: sshd@17-10.0.0.77:22-10.0.0.1:38498.service: Deactivated successfully. May 13 00:44:46.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.77:22-10.0.0.1:38498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.642877 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:44:46.643492 systemd-logind[1190]: Session 18 logged out. Waiting for processes to exit. May 13 00:44:46.644934 systemd[1]: Started sshd@18-10.0.0.77:22-10.0.0.1:38508.service. May 13 00:44:46.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.77:22-10.0.0.1:38508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:46.646156 systemd-logind[1190]: Removed session 18. May 13 00:44:46.685000 audit[4892]: USER_ACCT pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.687265 sshd[4892]: Accepted publickey for core from 10.0.0.1 port 38508 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:46.686000 audit[4892]: CRED_ACQ pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.686000 audit[4892]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd97672a10 a2=3 a3=0 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.686000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:46.688189 sshd[4892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:46.691532 systemd-logind[1190]: New session 19 of user core. May 13 00:44:46.692443 systemd[1]: Started session-19.scope. May 13 00:44:46.694000 audit[4892]: USER_START pid=4892 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:46.695000 audit[4894]: CRED_ACQ pid=4894 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030084e0 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003008500 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003008520 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:47.212000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:44:47.212000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e326a0 a2=fc6 a3=0 items=0 ppid=1645 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c308 key=(null) May 13 00:44:47.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:44:48.370000 audit[4907]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.370000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff30382270 a2=0 a3=7fff3038225c items=0 ppid=2086 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.383000 audit[4907]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.383000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff30382270 a2=0 a3=0 items=0 ppid=2086 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.387526 sshd[4892]: pam_unix(sshd:session): session closed for user core May 13 00:44:48.387000 audit[4892]: USER_END pid=4892 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.387000 audit[4892]: CRED_DISP pid=4892 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.392145 systemd[1]: Started sshd@19-10.0.0.77:22-10.0.0.1:38518.service. May 13 00:44:48.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.77:22-10.0.0.1:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:48.392752 systemd[1]: sshd@18-10.0.0.77:22-10.0.0.1:38508.service: Deactivated successfully. May 13 00:44:48.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.77:22-10.0.0.1:38508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:48.393606 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:44:48.394470 systemd-logind[1190]: Session 19 logged out. Waiting for processes to exit. May 13 00:44:48.396263 systemd-logind[1190]: Removed session 19. May 13 00:44:48.406000 audit[4913]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.406000 audit[4913]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff3ccfd9a0 a2=0 a3=7fff3ccfd98c items=0 ppid=2086 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.410000 audit[4913]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.410000 audit[4913]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff3ccfd9a0 a2=0 a3=0 items=0 ppid=2086 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.440000 audit[4909]: USER_ACCT pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.442534 sshd[4909]: Accepted publickey for core from 10.0.0.1 port 38518 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:48.441000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.441000 audit[4909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3a2df840 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.441000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:48.443800 sshd[4909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:48.447040 systemd-logind[1190]: New session 20 of user core. May 13 00:44:48.447760 systemd[1]: Started session-20.scope. May 13 00:44:48.450000 audit[4909]: USER_START pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.451000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.756271 sshd[4909]: pam_unix(sshd:session): session closed for user core May 13 00:44:48.756000 audit[4909]: USER_END pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.756000 audit[4909]: CRED_DISP pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.760061 systemd[1]: Started sshd@20-10.0.0.77:22-10.0.0.1:38524.service. May 13 00:44:48.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.77:22-10.0.0.1:38524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:48.760554 systemd[1]: sshd@19-10.0.0.77:22-10.0.0.1:38518.service: Deactivated successfully. May 13 00:44:48.761692 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:44:48.763557 systemd-logind[1190]: Session 20 logged out. Waiting for processes to exit. May 13 00:44:48.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.77:22-10.0.0.1:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:48.765254 systemd-logind[1190]: Removed session 20. May 13 00:44:48.800000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.802890 sshd[4923]: Accepted publickey for core from 10.0.0.1 port 38524 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:48.802000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.802000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7f374a0 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:48.804080 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:48.808311 systemd-logind[1190]: New session 21 of user core. May 13 00:44:48.809103 systemd[1]: Started session-21.scope. May 13 00:44:48.814000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.815000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.913589 sshd[4923]: pam_unix(sshd:session): session closed for user core May 13 00:44:48.912000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.912000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:48.915981 systemd[1]: sshd@20-10.0.0.77:22-10.0.0.1:38524.service: Deactivated successfully. May 13 00:44:48.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.77:22-10.0.0.1:38524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:48.916704 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:44:48.917188 systemd-logind[1190]: Session 21 logged out. Waiting for processes to exit. May 13 00:44:48.917844 systemd-logind[1190]: Removed session 21. May 13 00:44:53.919140 systemd[1]: Started sshd@21-10.0.0.77:22-10.0.0.1:47788.service. May 13 00:44:53.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.77:22-10.0.0.1:47788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:53.920457 kernel: kauditd_printk_skb: 69 callbacks suppressed May 13 00:44:53.920543 kernel: audit: type=1130 audit(1747097093.918:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.77:22-10.0.0.1:47788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:53.960000 audit[4941]: USER_ACCT pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.961718 sshd[4941]: Accepted publickey for core from 10.0.0.1 port 47788 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:53.963567 sshd[4941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:53.962000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.968103 systemd-logind[1190]: New session 22 of user core. May 13 00:44:53.968934 systemd[1]: Started session-22.scope. May 13 00:44:53.971249 kernel: audit: type=1101 audit(1747097093.960:1485): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.971309 kernel: audit: type=1103 audit(1747097093.962:1486): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.971332 kernel: audit: type=1006 audit(1747097093.962:1487): pid=4941 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 00:44:53.962000 audit[4941]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff12598ea0 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.979335 kernel: audit: type=1300 audit(1747097093.962:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff12598ea0 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.979404 kernel: audit: type=1327 audit(1747097093.962:1487): proctitle=737368643A20636F7265205B707269765D May 13 00:44:53.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:53.976000 audit[4941]: USER_START pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.986532 kernel: audit: type=1105 audit(1747097093.976:1488): pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.986581 kernel: audit: type=1103 audit(1747097093.978:1489): pid=4945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:53.978000 audit[4945]: CRED_ACQ pid=4945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:54.081407 sshd[4941]: pam_unix(sshd:session): session closed for user core May 13 00:44:54.081000 audit[4941]: USER_END pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:54.084152 systemd[1]: sshd@21-10.0.0.77:22-10.0.0.1:47788.service: Deactivated successfully. May 13 00:44:54.085054 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:44:54.081000 audit[4941]: CRED_DISP pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:54.088325 systemd-logind[1190]: Session 22 logged out. Waiting for processes to exit. May 13 00:44:54.089187 systemd-logind[1190]: Removed session 22. May 13 00:44:54.090222 kernel: audit: type=1106 audit(1747097094.081:1490): pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:54.090303 kernel: audit: type=1104 audit(1747097094.081:1491): pid=4941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:54.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.77:22-10.0.0.1:47788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:54.407000 audit[4976]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:54.407000 audit[4976]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe99bd0740 a2=0 a3=7ffe99bd072c items=0 ppid=2086 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:54.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:54.414000 audit[4976]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=4976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:54.414000 audit[4976]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe99bd0740 a2=0 a3=7ffe99bd072c items=0 ppid=2086 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:54.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:59.085979 systemd[1]: Started sshd@22-10.0.0.77:22-10.0.0.1:47790.service. May 13 00:44:59.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.77:22-10.0.0.1:47790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:59.087422 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:44:59.087490 kernel: audit: type=1130 audit(1747097099.085:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.77:22-10.0.0.1:47790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:59.129000 audit[4979]: USER_ACCT pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.130399 sshd[4979]: Accepted publickey for core from 10.0.0.1 port 47790 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:59.133000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.134442 sshd[4979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:59.137631 kernel: audit: type=1101 audit(1747097099.129:1496): pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.137707 kernel: audit: type=1103 audit(1747097099.133:1497): pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.137741 kernel: audit: type=1006 audit(1747097099.133:1498): pid=4979 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:44:59.138280 systemd-logind[1190]: New session 23 of user core. May 13 00:44:59.139311 systemd[1]: Started session-23.scope. May 13 00:44:59.133000 audit[4979]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31fac810 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:59.143731 kernel: audit: type=1300 audit(1747097099.133:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31fac810 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:59.143782 kernel: audit: type=1327 audit(1747097099.133:1498): proctitle=737368643A20636F7265205B707269765D May 13 00:44:59.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:59.143000 audit[4979]: USER_START pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.149180 kernel: audit: type=1105 audit(1747097099.143:1499): pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.149224 kernel: audit: type=1103 audit(1747097099.144:1500): pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.144000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.250907 sshd[4979]: pam_unix(sshd:session): session closed for user core May 13 00:44:59.251000 audit[4979]: USER_END pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.253369 systemd[1]: sshd@22-10.0.0.77:22-10.0.0.1:47790.service: Deactivated successfully. May 13 00:44:59.254156 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:44:59.254791 systemd-logind[1190]: Session 23 logged out. Waiting for processes to exit. May 13 00:44:59.255702 systemd-logind[1190]: Removed session 23. May 13 00:44:59.251000 audit[4979]: CRED_DISP pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.261804 kernel: audit: type=1106 audit(1747097099.251:1501): pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.261874 kernel: audit: type=1104 audit(1747097099.251:1502): pid=4979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:59.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.77:22-10.0.0.1:47790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:59.742234 kubelet[1940]: E0513 00:44:59.742203 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:03.739447 kubelet[1940]: E0513 00:45:03.739390 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:04.260734 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:45:04.260865 kernel: audit: type=1130 audit(1747097104.255:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.77:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:04.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.77:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:04.255545 systemd[1]: Started sshd@23-10.0.0.77:22-10.0.0.1:34128.service. May 13 00:45:04.297000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.298151 sshd[5014]: Accepted publickey for core from 10.0.0.1 port 34128 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:45:04.302730 kernel: audit: type=1101 audit(1747097104.297:1505): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.302000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.303065 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:04.308582 systemd[1]: Started session-24.scope. May 13 00:45:04.309740 systemd-logind[1190]: New session 24 of user core. May 13 00:45:04.310525 kernel: audit: type=1103 audit(1747097104.302:1506): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.310584 kernel: audit: type=1006 audit(1747097104.302:1507): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:45:04.302000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8564e9f0 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.302000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:04.317629 kernel: audit: type=1300 audit(1747097104.302:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8564e9f0 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.317727 kernel: audit: type=1327 audit(1747097104.302:1507): proctitle=737368643A20636F7265205B707269765D May 13 00:45:04.317759 kernel: audit: type=1105 audit(1747097104.316:1508): pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.316000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.317000 audit[5016]: CRED_ACQ pid=5016 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.325314 kernel: audit: type=1103 audit(1747097104.317:1509): pid=5016 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.425349 sshd[5014]: pam_unix(sshd:session): session closed for user core May 13 00:45:04.425000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.427710 systemd[1]: sshd@23-10.0.0.77:22-10.0.0.1:34128.service: Deactivated successfully. May 13 00:45:04.428457 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:45:04.429251 systemd-logind[1190]: Session 24 logged out. Waiting for processes to exit. May 13 00:45:04.430087 systemd-logind[1190]: Removed session 24. May 13 00:45:04.425000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.433906 kernel: audit: type=1106 audit(1747097104.425:1510): pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.433965 kernel: audit: type=1104 audit(1747097104.425:1511): pid=5014 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:04.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.77:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:04.739463 kubelet[1940]: E0513 00:45:04.739428 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:09.432704 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:45:09.432836 kernel: audit: type=1130 audit(1747097109.429:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.77:22-10.0.0.1:34142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:09.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.77:22-10.0.0.1:34142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:09.431232 systemd[1]: Started sshd@24-10.0.0.77:22-10.0.0.1:34142.service. May 13 00:45:09.470000 audit[5036]: USER_ACCT pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.472409 sshd[5036]: Accepted publickey for core from 10.0.0.1 port 34142 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:45:09.474000 audit[5036]: CRED_ACQ pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.476652 sshd[5036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:09.479872 kernel: audit: type=1101 audit(1747097109.470:1514): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.479937 kernel: audit: type=1103 audit(1747097109.474:1515): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.479964 kernel: audit: type=1006 audit(1747097109.474:1516): pid=5036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 00:45:09.480539 systemd-logind[1190]: New session 25 of user core. May 13 00:45:09.481586 systemd[1]: Started session-25.scope. May 13 00:45:09.482114 kernel: audit: type=1300 audit(1747097109.474:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91f15240 a2=3 a3=0 items=0 ppid=1 pid=5036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:09.474000 audit[5036]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91f15240 a2=3 a3=0 items=0 ppid=1 pid=5036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:09.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:09.487374 kernel: audit: type=1327 audit(1747097109.474:1516): proctitle=737368643A20636F7265205B707269765D May 13 00:45:09.487433 kernel: audit: type=1105 audit(1747097109.484:1517): pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.484000 audit[5036]: USER_START pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.491584 kernel: audit: type=1103 audit(1747097109.486:1518): pid=5038 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.486000 audit[5038]: CRED_ACQ pid=5038 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.590476 sshd[5036]: pam_unix(sshd:session): session closed for user core May 13 00:45:09.589000 audit[5036]: USER_END pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.593017 systemd[1]: sshd@24-10.0.0.77:22-10.0.0.1:34142.service: Deactivated successfully. May 13 00:45:09.593805 systemd[1]: session-25.scope: Deactivated successfully. May 13 00:45:09.594349 systemd-logind[1190]: Session 25 logged out. Waiting for processes to exit. May 13 00:45:09.595124 systemd-logind[1190]: Removed session 25. May 13 00:45:09.590000 audit[5036]: CRED_DISP pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.600474 kernel: audit: type=1106 audit(1747097109.589:1519): pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.600547 kernel: audit: type=1104 audit(1747097109.590:1520): pid=5036 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:09.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.77:22-10.0.0.1:34142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'