May 13 00:28:55.746086 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 13 00:28:55.746106 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon May 12 23:22:00 -00 2025 May 13 00:28:55.746113 kernel: efi: EFI v2.70 by EDK II May 13 00:28:55.746119 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 13 00:28:55.746124 kernel: random: crng init done May 13 00:28:55.746130 kernel: ACPI: Early table checksum verification disabled May 13 00:28:55.746136 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 13 00:28:55.746143 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 13 00:28:55.746148 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746154 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746159 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746164 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746170 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746175 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746183 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746189 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746195 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:28:55.746201 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 13 00:28:55.746223 kernel: NUMA: Failed to initialise from firmware May 13 00:28:55.746229 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:28:55.746235 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] May 13 00:28:55.746240 kernel: Zone ranges: May 13 00:28:55.746246 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:28:55.746254 kernel: DMA32 empty May 13 00:28:55.746260 kernel: Normal empty May 13 00:28:55.746266 kernel: Movable zone start for each node May 13 00:28:55.746271 kernel: Early memory node ranges May 13 00:28:55.746277 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 13 00:28:55.746283 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 13 00:28:55.746289 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 13 00:28:55.746295 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 13 00:28:55.746300 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 13 00:28:55.746306 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 13 00:28:55.746312 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 13 00:28:55.746317 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:28:55.746324 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 13 00:28:55.746330 kernel: psci: probing for conduit method from ACPI. May 13 00:28:55.746336 kernel: psci: PSCIv1.1 detected in firmware. May 13 00:28:55.746341 kernel: psci: Using standard PSCI v0.2 function IDs May 13 00:28:55.746347 kernel: psci: Trusted OS migration not required May 13 00:28:55.746363 kernel: psci: SMC Calling Convention v1.1 May 13 00:28:55.746369 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 13 00:28:55.746376 kernel: ACPI: SRAT not present May 13 00:28:55.746383 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 13 00:28:55.746389 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 13 00:28:55.746395 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 13 00:28:55.746401 kernel: Detected PIPT I-cache on CPU0 May 13 00:28:55.746407 kernel: CPU features: detected: GIC system register CPU interface May 13 00:28:55.746413 kernel: CPU features: detected: Hardware dirty bit management May 13 00:28:55.746419 kernel: CPU features: detected: Spectre-v4 May 13 00:28:55.746426 kernel: CPU features: detected: Spectre-BHB May 13 00:28:55.746433 kernel: CPU features: kernel page table isolation forced ON by KASLR May 13 00:28:55.746439 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 13 00:28:55.746445 kernel: CPU features: detected: ARM erratum 1418040 May 13 00:28:55.746451 kernel: CPU features: detected: SSBS not fully self-synchronizing May 13 00:28:55.746457 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 13 00:28:55.746463 kernel: Policy zone: DMA May 13 00:28:55.746471 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:28:55.746477 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:28:55.746483 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:28:55.746490 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:28:55.746496 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:28:55.746509 kernel: Memory: 2457336K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114952K reserved, 0K cma-reserved) May 13 00:28:55.746516 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:28:55.746522 kernel: trace event string verifier disabled May 13 00:28:55.746528 kernel: rcu: Preemptible hierarchical RCU implementation. May 13 00:28:55.746535 kernel: rcu: RCU event tracing is enabled. May 13 00:28:55.746541 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:28:55.746548 kernel: Trampoline variant of Tasks RCU enabled. May 13 00:28:55.746554 kernel: Tracing variant of Tasks RCU enabled. May 13 00:28:55.746560 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:28:55.746566 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:28:55.746572 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 13 00:28:55.746580 kernel: GICv3: 256 SPIs implemented May 13 00:28:55.746586 kernel: GICv3: 0 Extended SPIs implemented May 13 00:28:55.746592 kernel: GICv3: Distributor has no Range Selector support May 13 00:28:55.746598 kernel: Root IRQ handler: gic_handle_irq May 13 00:28:55.746604 kernel: GICv3: 16 PPIs implemented May 13 00:28:55.746611 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 13 00:28:55.746617 kernel: ACPI: SRAT not present May 13 00:28:55.746623 kernel: ITS [mem 0x08080000-0x0809ffff] May 13 00:28:55.746629 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 13 00:28:55.746635 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 13 00:28:55.746641 kernel: GICv3: using LPI property table @0x00000000400d0000 May 13 00:28:55.746648 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 13 00:28:55.746655 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:28:55.746661 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 13 00:28:55.746668 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 13 00:28:55.746674 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 13 00:28:55.746680 kernel: arm-pv: using stolen time PV May 13 00:28:55.746686 kernel: Console: colour dummy device 80x25 May 13 00:28:55.746693 kernel: ACPI: Core revision 20210730 May 13 00:28:55.746699 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 13 00:28:55.746706 kernel: pid_max: default: 32768 minimum: 301 May 13 00:28:55.746712 kernel: LSM: Security Framework initializing May 13 00:28:55.746719 kernel: SELinux: Initializing. May 13 00:28:55.746726 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:28:55.746732 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:28:55.746739 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 13 00:28:55.746745 kernel: rcu: Hierarchical SRCU implementation. May 13 00:28:55.746751 kernel: Platform MSI: ITS@0x8080000 domain created May 13 00:28:55.746758 kernel: PCI/MSI: ITS@0x8080000 domain created May 13 00:28:55.746764 kernel: Remapping and enabling EFI services. May 13 00:28:55.746770 kernel: smp: Bringing up secondary CPUs ... May 13 00:28:55.746778 kernel: Detected PIPT I-cache on CPU1 May 13 00:28:55.746784 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 13 00:28:55.746790 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 13 00:28:55.746797 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:28:55.746803 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 13 00:28:55.746809 kernel: Detected PIPT I-cache on CPU2 May 13 00:28:55.746816 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 13 00:28:55.746822 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 13 00:28:55.746829 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:28:55.746835 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 13 00:28:55.746842 kernel: Detected PIPT I-cache on CPU3 May 13 00:28:55.746849 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 13 00:28:55.746855 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 13 00:28:55.746862 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:28:55.746872 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 13 00:28:55.746880 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:28:55.746887 kernel: SMP: Total of 4 processors activated. May 13 00:28:55.746893 kernel: CPU features: detected: 32-bit EL0 Support May 13 00:28:55.746900 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 13 00:28:55.746907 kernel: CPU features: detected: Common not Private translations May 13 00:28:55.746913 kernel: CPU features: detected: CRC32 instructions May 13 00:28:55.746920 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 13 00:28:55.746928 kernel: CPU features: detected: LSE atomic instructions May 13 00:28:55.746934 kernel: CPU features: detected: Privileged Access Never May 13 00:28:55.746941 kernel: CPU features: detected: RAS Extension Support May 13 00:28:55.746948 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 13 00:28:55.746954 kernel: CPU: All CPU(s) started at EL1 May 13 00:28:55.746962 kernel: alternatives: patching kernel code May 13 00:28:55.746969 kernel: devtmpfs: initialized May 13 00:28:55.746975 kernel: KASLR enabled May 13 00:28:55.746982 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:28:55.746989 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:28:55.746996 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:28:55.747006 kernel: SMBIOS 3.0.0 present. May 13 00:28:55.747012 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 13 00:28:55.747019 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:28:55.747027 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 13 00:28:55.747034 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 13 00:28:55.747041 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 13 00:28:55.747048 kernel: audit: initializing netlink subsys (disabled) May 13 00:28:55.747054 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 May 13 00:28:55.747061 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:28:55.747068 kernel: cpuidle: using governor menu May 13 00:28:55.747074 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 13 00:28:55.747081 kernel: ASID allocator initialised with 32768 entries May 13 00:28:55.747089 kernel: ACPI: bus type PCI registered May 13 00:28:55.747096 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:28:55.747103 kernel: Serial: AMBA PL011 UART driver May 13 00:28:55.747109 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:28:55.747116 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 13 00:28:55.747123 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:28:55.747129 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 13 00:28:55.747136 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:28:55.747143 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 13 00:28:55.747151 kernel: ACPI: Added _OSI(Module Device) May 13 00:28:55.747158 kernel: ACPI: Added _OSI(Processor Device) May 13 00:28:55.747164 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:28:55.747171 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:28:55.747178 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:28:55.747184 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:28:55.747191 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:28:55.747198 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:28:55.747205 kernel: ACPI: Interpreter enabled May 13 00:28:55.747212 kernel: ACPI: Using GIC for interrupt routing May 13 00:28:55.747219 kernel: ACPI: MCFG table detected, 1 entries May 13 00:28:55.747226 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 13 00:28:55.747233 kernel: printk: console [ttyAMA0] enabled May 13 00:28:55.747239 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:28:55.747379 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:28:55.747450 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 13 00:28:55.747526 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 13 00:28:55.747586 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 13 00:28:55.747643 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 13 00:28:55.747651 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 13 00:28:55.747658 kernel: PCI host bridge to bus 0000:00 May 13 00:28:55.747724 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 13 00:28:55.747781 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 13 00:28:55.747839 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 13 00:28:55.747894 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:28:55.747987 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 13 00:28:55.748062 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:28:55.748125 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 13 00:28:55.748186 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 13 00:28:55.748245 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:28:55.748306 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:28:55.748377 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 13 00:28:55.748439 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 13 00:28:55.748492 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 13 00:28:55.748555 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 13 00:28:55.748614 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 13 00:28:55.748623 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 13 00:28:55.748630 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 13 00:28:55.748640 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 13 00:28:55.748647 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 13 00:28:55.748653 kernel: iommu: Default domain type: Translated May 13 00:28:55.748660 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 13 00:28:55.748667 kernel: vgaarb: loaded May 13 00:28:55.748674 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:28:55.748681 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:28:55.748687 kernel: PTP clock support registered May 13 00:28:55.748694 kernel: Registered efivars operations May 13 00:28:55.748702 kernel: clocksource: Switched to clocksource arch_sys_counter May 13 00:28:55.748709 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:28:55.748716 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:28:55.748722 kernel: pnp: PnP ACPI init May 13 00:28:55.748792 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 13 00:28:55.748802 kernel: pnp: PnP ACPI: found 1 devices May 13 00:28:55.748808 kernel: NET: Registered PF_INET protocol family May 13 00:28:55.748815 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:28:55.748824 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:28:55.748831 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:28:55.748838 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:28:55.748844 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:28:55.748851 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:28:55.748858 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:28:55.748865 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:28:55.748872 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:28:55.748878 kernel: PCI: CLS 0 bytes, default 64 May 13 00:28:55.748886 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 13 00:28:55.748893 kernel: kvm [1]: HYP mode not available May 13 00:28:55.748899 kernel: Initialise system trusted keyrings May 13 00:28:55.748906 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:28:55.748913 kernel: Key type asymmetric registered May 13 00:28:55.748919 kernel: Asymmetric key parser 'x509' registered May 13 00:28:55.748926 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:28:55.748933 kernel: io scheduler mq-deadline registered May 13 00:28:55.748940 kernel: io scheduler kyber registered May 13 00:28:55.748947 kernel: io scheduler bfq registered May 13 00:28:55.748954 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 13 00:28:55.748961 kernel: ACPI: button: Power Button [PWRB] May 13 00:28:55.748968 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 13 00:28:55.749028 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 13 00:28:55.749037 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:28:55.749044 kernel: thunder_xcv, ver 1.0 May 13 00:28:55.749051 kernel: thunder_bgx, ver 1.0 May 13 00:28:55.749057 kernel: nicpf, ver 1.0 May 13 00:28:55.749065 kernel: nicvf, ver 1.0 May 13 00:28:55.749131 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 13 00:28:55.749188 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-13T00:28:55 UTC (1747096135) May 13 00:28:55.749197 kernel: hid: raw HID events driver (C) Jiri Kosina May 13 00:28:55.749204 kernel: NET: Registered PF_INET6 protocol family May 13 00:28:55.749210 kernel: Segment Routing with IPv6 May 13 00:28:55.749217 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:28:55.749224 kernel: NET: Registered PF_PACKET protocol family May 13 00:28:55.749232 kernel: Key type dns_resolver registered May 13 00:28:55.749238 kernel: registered taskstats version 1 May 13 00:28:55.749245 kernel: Loading compiled-in X.509 certificates May 13 00:28:55.749252 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: d291b704d59536a3c0ba96fd6f5a99459de8de99' May 13 00:28:55.749258 kernel: Key type .fscrypt registered May 13 00:28:55.749265 kernel: Key type fscrypt-provisioning registered May 13 00:28:55.749272 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:28:55.749278 kernel: ima: Allocated hash algorithm: sha1 May 13 00:28:55.749285 kernel: ima: No architecture policies found May 13 00:28:55.749293 kernel: clk: Disabling unused clocks May 13 00:28:55.749299 kernel: Freeing unused kernel memory: 36480K May 13 00:28:55.749306 kernel: Run /init as init process May 13 00:28:55.749313 kernel: with arguments: May 13 00:28:55.749319 kernel: /init May 13 00:28:55.749326 kernel: with environment: May 13 00:28:55.749332 kernel: HOME=/ May 13 00:28:55.749339 kernel: TERM=linux May 13 00:28:55.749345 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:28:55.749362 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:28:55.749372 systemd[1]: Detected virtualization kvm. May 13 00:28:55.749380 systemd[1]: Detected architecture arm64. May 13 00:28:55.749387 systemd[1]: Running in initrd. May 13 00:28:55.749394 systemd[1]: No hostname configured, using default hostname. May 13 00:28:55.749401 systemd[1]: Hostname set to . May 13 00:28:55.749408 systemd[1]: Initializing machine ID from VM UUID. May 13 00:28:55.749416 systemd[1]: Queued start job for default target initrd.target. May 13 00:28:55.749424 systemd[1]: Started systemd-ask-password-console.path. May 13 00:28:55.749431 systemd[1]: Reached target cryptsetup.target. May 13 00:28:55.749437 systemd[1]: Reached target paths.target. May 13 00:28:55.749444 systemd[1]: Reached target slices.target. May 13 00:28:55.749451 systemd[1]: Reached target swap.target. May 13 00:28:55.749459 systemd[1]: Reached target timers.target. May 13 00:28:55.749466 systemd[1]: Listening on iscsid.socket. May 13 00:28:55.749474 systemd[1]: Listening on iscsiuio.socket. May 13 00:28:55.749482 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:28:55.749489 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:28:55.749496 systemd[1]: Listening on systemd-journald.socket. May 13 00:28:55.749509 systemd[1]: Listening on systemd-networkd.socket. May 13 00:28:55.749517 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:28:55.749524 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:28:55.749531 systemd[1]: Reached target sockets.target. May 13 00:28:55.749540 systemd[1]: Starting kmod-static-nodes.service... May 13 00:28:55.749547 systemd[1]: Finished network-cleanup.service. May 13 00:28:55.749554 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:28:55.749562 systemd[1]: Starting systemd-journald.service... May 13 00:28:55.749569 systemd[1]: Starting systemd-modules-load.service... May 13 00:28:55.749576 systemd[1]: Starting systemd-resolved.service... May 13 00:28:55.749583 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:28:55.749590 systemd[1]: Finished kmod-static-nodes.service. May 13 00:28:55.749597 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:28:55.749605 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:28:55.749615 systemd-journald[291]: Journal started May 13 00:28:55.749656 systemd-journald[291]: Runtime Journal (/run/log/journal/96b125b08e43491cb1a2af1dea6f0075) is 6.0M, max 48.7M, 42.6M free. May 13 00:28:55.745725 systemd-modules-load[292]: Inserted module 'overlay' May 13 00:28:55.752002 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:28:55.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.755575 kernel: audit: type=1130 audit(1747096135.751:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.755599 systemd[1]: Started systemd-journald.service. May 13 00:28:55.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.756363 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:28:55.762354 kernel: audit: type=1130 audit(1747096135.755:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.762372 kernel: audit: type=1130 audit(1747096135.758:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.763204 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:28:55.770193 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:28:55.773077 systemd-modules-load[292]: Inserted module 'br_netfilter' May 13 00:28:55.773988 kernel: Bridge firewalling registered May 13 00:28:55.773475 systemd-resolved[293]: Positive Trust Anchors: May 13 00:28:55.773484 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:28:55.773526 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:28:55.777663 systemd-resolved[293]: Defaulting to hostname 'linux'. May 13 00:28:55.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.778474 systemd[1]: Started systemd-resolved.service. May 13 00:28:55.787622 kernel: audit: type=1130 audit(1747096135.781:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.787638 kernel: SCSI subsystem initialized May 13 00:28:55.784711 systemd[1]: Reached target nss-lookup.target. May 13 00:28:55.789078 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:28:55.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.793404 systemd[1]: Starting dracut-cmdline.service... May 13 00:28:55.796794 kernel: audit: type=1130 audit(1747096135.789:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.796812 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:28:55.796823 kernel: device-mapper: uevent: version 1.0.3 May 13 00:28:55.796832 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:28:55.799951 systemd-modules-load[292]: Inserted module 'dm_multipath' May 13 00:28:55.800721 systemd[1]: Finished systemd-modules-load.service. May 13 00:28:55.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.802310 systemd[1]: Starting systemd-sysctl.service... May 13 00:28:55.806029 kernel: audit: type=1130 audit(1747096135.801:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.806118 dracut-cmdline[310]: dracut-dracut-053 May 13 00:28:55.809886 dracut-cmdline[310]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:28:55.811703 systemd[1]: Finished systemd-sysctl.service. May 13 00:28:55.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.818536 kernel: audit: type=1130 audit(1747096135.814:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.872545 kernel: Loading iSCSI transport class v2.0-870. May 13 00:28:55.885661 kernel: iscsi: registered transport (tcp) May 13 00:28:55.902537 kernel: iscsi: registered transport (qla4xxx) May 13 00:28:55.902562 kernel: QLogic iSCSI HBA Driver May 13 00:28:55.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.935891 systemd[1]: Finished dracut-cmdline.service. May 13 00:28:55.939737 kernel: audit: type=1130 audit(1747096135.936:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:55.937763 systemd[1]: Starting dracut-pre-udev.service... May 13 00:28:55.985543 kernel: raid6: neonx8 gen() 13655 MB/s May 13 00:28:56.002535 kernel: raid6: neonx8 xor() 10640 MB/s May 13 00:28:56.019537 kernel: raid6: neonx4 gen() 13387 MB/s May 13 00:28:56.036528 kernel: raid6: neonx4 xor() 11069 MB/s May 13 00:28:56.053528 kernel: raid6: neonx2 gen() 12861 MB/s May 13 00:28:56.070538 kernel: raid6: neonx2 xor() 10270 MB/s May 13 00:28:56.087534 kernel: raid6: neonx1 gen() 10498 MB/s May 13 00:28:56.104532 kernel: raid6: neonx1 xor() 8720 MB/s May 13 00:28:56.121541 kernel: raid6: int64x8 gen() 6224 MB/s May 13 00:28:56.138541 kernel: raid6: int64x8 xor() 3515 MB/s May 13 00:28:56.155532 kernel: raid6: int64x4 gen() 7139 MB/s May 13 00:28:56.172532 kernel: raid6: int64x4 xor() 3812 MB/s May 13 00:28:56.189534 kernel: raid6: int64x2 gen() 6095 MB/s May 13 00:28:56.206533 kernel: raid6: int64x2 xor() 3284 MB/s May 13 00:28:56.223531 kernel: raid6: int64x1 gen() 4998 MB/s May 13 00:28:56.240614 kernel: raid6: int64x1 xor() 2626 MB/s May 13 00:28:56.240650 kernel: raid6: using algorithm neonx8 gen() 13655 MB/s May 13 00:28:56.240669 kernel: raid6: .... xor() 10640 MB/s, rmw enabled May 13 00:28:56.241657 kernel: raid6: using neon recovery algorithm May 13 00:28:56.252887 kernel: xor: measuring software checksum speed May 13 00:28:56.252913 kernel: 8regs : 17246 MB/sec May 13 00:28:56.252930 kernel: 32regs : 19961 MB/sec May 13 00:28:56.254111 kernel: arm64_neon : 27832 MB/sec May 13 00:28:56.254125 kernel: xor: using function: arm64_neon (27832 MB/sec) May 13 00:28:56.308542 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 13 00:28:56.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:56.320016 systemd[1]: Finished dracut-pre-udev.service. May 13 00:28:56.323803 kernel: audit: type=1130 audit(1747096136.320:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:56.322000 audit: BPF prog-id=7 op=LOAD May 13 00:28:56.323000 audit: BPF prog-id=8 op=LOAD May 13 00:28:56.324499 systemd[1]: Starting systemd-udevd.service... May 13 00:28:56.340879 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 13 00:28:56.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:56.344491 systemd[1]: Started systemd-udevd.service. May 13 00:28:56.354621 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:28:56.366767 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 13 00:28:56.394963 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:28:56.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:56.396688 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:28:56.443922 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:28:56.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:56.472550 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:28:56.480355 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:28:56.480371 kernel: GPT:9289727 != 19775487 May 13 00:28:56.480381 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:28:56.480397 kernel: GPT:9289727 != 19775487 May 13 00:28:56.480405 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:28:56.480413 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:28:56.495947 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:28:56.498334 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (546) May 13 00:28:56.502309 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:28:56.506899 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:28:56.509847 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:28:56.510842 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:28:56.513656 systemd[1]: Starting disk-uuid.service... May 13 00:28:56.519178 disk-uuid[556]: Primary Header is updated. May 13 00:28:56.519178 disk-uuid[556]: Secondary Entries is updated. May 13 00:28:56.519178 disk-uuid[556]: Secondary Header is updated. May 13 00:28:56.522521 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:28:57.530051 disk-uuid[557]: The operation has completed successfully. May 13 00:28:57.531154 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:28:57.551402 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:28:57.551503 systemd[1]: Finished disk-uuid.service. May 13 00:28:57.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.558331 systemd[1]: Starting verity-setup.service... May 13 00:28:57.573546 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 13 00:28:57.594095 systemd[1]: Found device dev-mapper-usr.device. May 13 00:28:57.598024 systemd[1]: Mounting sysusr-usr.mount... May 13 00:28:57.598872 systemd[1]: Finished verity-setup.service. May 13 00:28:57.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.648358 systemd[1]: Mounted sysusr-usr.mount. May 13 00:28:57.649665 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:28:57.649196 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:28:57.649917 systemd[1]: Starting ignition-setup.service... May 13 00:28:57.652145 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:28:57.659774 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:28:57.659813 kernel: BTRFS info (device vda6): using free space tree May 13 00:28:57.659824 kernel: BTRFS info (device vda6): has skinny extents May 13 00:28:57.668169 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:28:57.673783 systemd[1]: Finished ignition-setup.service. May 13 00:28:57.675241 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:28:57.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.739099 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:28:57.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.740000 audit: BPF prog-id=9 op=LOAD May 13 00:28:57.741485 systemd[1]: Starting systemd-networkd.service... May 13 00:28:57.768353 systemd-networkd[734]: lo: Link UP May 13 00:28:57.768361 systemd-networkd[734]: lo: Gained carrier May 13 00:28:57.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.768811 systemd-networkd[734]: Enumeration completed May 13 00:28:57.768911 systemd[1]: Started systemd-networkd.service. May 13 00:28:57.768986 systemd-networkd[734]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:28:57.770015 systemd-networkd[734]: eth0: Link UP May 13 00:28:57.770018 systemd-networkd[734]: eth0: Gained carrier May 13 00:28:57.770410 systemd[1]: Reached target network.target. May 13 00:28:57.772496 systemd[1]: Starting iscsiuio.service... May 13 00:28:57.785607 systemd[1]: Started iscsiuio.service. May 13 00:28:57.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.787426 systemd[1]: Starting iscsid.service... May 13 00:28:57.789598 systemd-networkd[734]: eth0: DHCPv4 address 10.0.0.75/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:28:57.791236 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:28:57.791236 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:28:57.791236 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:28:57.791236 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:28:57.791236 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:28:57.791236 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:28:57.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.793314 ignition[642]: Ignition 2.14.0 May 13 00:28:57.795248 systemd[1]: Started iscsid.service. May 13 00:28:57.793321 ignition[642]: Stage: fetch-offline May 13 00:28:57.800121 systemd[1]: Starting dracut-initqueue.service... May 13 00:28:57.793384 ignition[642]: no configs at "/usr/lib/ignition/base.d" May 13 00:28:57.793393 ignition[642]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:57.793607 ignition[642]: parsed url from cmdline: "" May 13 00:28:57.793611 ignition[642]: no config URL provided May 13 00:28:57.793615 ignition[642]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:28:57.793623 ignition[642]: no config at "/usr/lib/ignition/user.ign" May 13 00:28:57.793641 ignition[642]: op(1): [started] loading QEMU firmware config module May 13 00:28:57.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.812052 systemd[1]: Finished dracut-initqueue.service. May 13 00:28:57.793646 ignition[642]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:28:57.813149 systemd[1]: Reached target remote-fs-pre.target. May 13 00:28:57.813467 ignition[642]: op(1): [finished] loading QEMU firmware config module May 13 00:28:57.814951 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:28:57.816440 systemd[1]: Reached target remote-fs.target. May 13 00:28:57.818746 systemd[1]: Starting dracut-pre-mount.service... May 13 00:28:57.826387 systemd[1]: Finished dracut-pre-mount.service. May 13 00:28:57.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.857732 ignition[642]: parsing config with SHA512: db4270567ef1b21ffc6bfd28631b1622aa12a7420ceae6c82eed2d0416f7252d4cfdedd29672fd2e1bc7fd36bb333c7474e5388370e865cabe0b53ae5911f6eb May 13 00:28:57.865573 unknown[642]: fetched base config from "system" May 13 00:28:57.865583 unknown[642]: fetched user config from "qemu" May 13 00:28:57.865982 ignition[642]: fetch-offline: fetch-offline passed May 13 00:28:57.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.867389 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:28:57.866032 ignition[642]: Ignition finished successfully May 13 00:28:57.868911 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:28:57.869651 systemd[1]: Starting ignition-kargs.service... May 13 00:28:57.878131 ignition[755]: Ignition 2.14.0 May 13 00:28:57.878142 ignition[755]: Stage: kargs May 13 00:28:57.878233 ignition[755]: no configs at "/usr/lib/ignition/base.d" May 13 00:28:57.880285 systemd[1]: Finished ignition-kargs.service. May 13 00:28:57.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.878243 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:57.879045 ignition[755]: kargs: kargs passed May 13 00:28:57.882561 systemd[1]: Starting ignition-disks.service... May 13 00:28:57.879084 ignition[755]: Ignition finished successfully May 13 00:28:57.888399 ignition[761]: Ignition 2.14.0 May 13 00:28:57.888408 ignition[761]: Stage: disks May 13 00:28:57.888490 ignition[761]: no configs at "/usr/lib/ignition/base.d" May 13 00:28:57.888500 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:57.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.890104 systemd[1]: Finished ignition-disks.service. May 13 00:28:57.889348 ignition[761]: disks: disks passed May 13 00:28:57.891243 systemd[1]: Reached target initrd-root-device.target. May 13 00:28:57.889385 ignition[761]: Ignition finished successfully May 13 00:28:57.892821 systemd[1]: Reached target local-fs-pre.target. May 13 00:28:57.894177 systemd[1]: Reached target local-fs.target. May 13 00:28:57.895396 systemd[1]: Reached target sysinit.target. May 13 00:28:57.896772 systemd[1]: Reached target basic.target. May 13 00:28:57.898768 systemd[1]: Starting systemd-fsck-root.service... May 13 00:28:57.910194 systemd-fsck[769]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 13 00:28:57.913723 systemd[1]: Finished systemd-fsck-root.service. May 13 00:28:57.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.915380 systemd[1]: Mounting sysroot.mount... May 13 00:28:57.921372 systemd[1]: Mounted sysroot.mount. May 13 00:28:57.922635 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:28:57.922143 systemd[1]: Reached target initrd-root-fs.target. May 13 00:28:57.924764 systemd[1]: Mounting sysroot-usr.mount... May 13 00:28:57.925690 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:28:57.925725 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:28:57.925748 systemd[1]: Reached target ignition-diskful.target. May 13 00:28:57.927676 systemd[1]: Mounted sysroot-usr.mount. May 13 00:28:57.929483 systemd[1]: Starting initrd-setup-root.service... May 13 00:28:57.933725 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:28:57.937227 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory May 13 00:28:57.941563 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:28:57.945819 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:28:57.971325 systemd[1]: Finished initrd-setup-root.service. May 13 00:28:57.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.972988 systemd[1]: Starting ignition-mount.service... May 13 00:28:57.974325 systemd[1]: Starting sysroot-boot.service... May 13 00:28:57.979032 bash[820]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:28:57.987732 ignition[822]: INFO : Ignition 2.14.0 May 13 00:28:57.987732 ignition[822]: INFO : Stage: mount May 13 00:28:57.989376 ignition[822]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:28:57.989376 ignition[822]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:57.989376 ignition[822]: INFO : mount: mount passed May 13 00:28:57.989376 ignition[822]: INFO : Ignition finished successfully May 13 00:28:57.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:57.989428 systemd[1]: Finished sysroot-boot.service. May 13 00:28:57.991199 systemd[1]: Finished ignition-mount.service. May 13 00:28:58.606614 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:28:58.612521 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (831) May 13 00:28:58.614990 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:28:58.615005 kernel: BTRFS info (device vda6): using free space tree May 13 00:28:58.615015 kernel: BTRFS info (device vda6): has skinny extents May 13 00:28:58.617793 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:28:58.619291 systemd[1]: Starting ignition-files.service... May 13 00:28:58.633585 ignition[851]: INFO : Ignition 2.14.0 May 13 00:28:58.633585 ignition[851]: INFO : Stage: files May 13 00:28:58.635132 ignition[851]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:28:58.635132 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:58.635132 ignition[851]: DEBUG : files: compiled without relabeling support, skipping May 13 00:28:58.638784 ignition[851]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:28:58.638784 ignition[851]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:28:58.641607 ignition[851]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:28:58.641607 ignition[851]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:28:58.641607 ignition[851]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:28:58.641278 unknown[851]: wrote ssh authorized keys file for user: core May 13 00:28:58.646435 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 13 00:28:58.646435 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 13 00:28:58.686658 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:28:58.827890 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 13 00:28:58.829971 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 13 00:28:59.159631 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:28:59.459826 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 13 00:28:59.459826 ignition[851]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:28:59.463395 ignition[851]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:28:59.506866 ignition[851]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:28:59.508410 ignition[851]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:28:59.508410 ignition[851]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:28:59.508410 ignition[851]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:28:59.508410 ignition[851]: INFO : files: files passed May 13 00:28:59.508410 ignition[851]: INFO : Ignition finished successfully May 13 00:28:59.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.508452 systemd[1]: Finished ignition-files.service. May 13 00:28:59.511570 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:28:59.518309 initrd-setup-root-after-ignition[876]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:28:59.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.512864 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:28:59.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.522586 initrd-setup-root-after-ignition[879]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:28:59.513549 systemd[1]: Starting ignition-quench.service... May 13 00:28:59.517548 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:28:59.517626 systemd[1]: Finished ignition-quench.service. May 13 00:28:59.519172 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:28:59.521027 systemd[1]: Reached target ignition-complete.target. May 13 00:28:59.523897 systemd[1]: Starting initrd-parse-etc.service... May 13 00:28:59.535562 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:28:59.535644 systemd[1]: Finished initrd-parse-etc.service. May 13 00:28:59.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.537263 systemd[1]: Reached target initrd-fs.target. May 13 00:28:59.538406 systemd[1]: Reached target initrd.target. May 13 00:28:59.539661 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:28:59.540327 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:28:59.550269 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:28:59.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.551814 systemd[1]: Starting initrd-cleanup.service... May 13 00:28:59.559326 systemd[1]: Stopped target nss-lookup.target. May 13 00:28:59.560827 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:28:59.561703 systemd[1]: Stopped target timers.target. May 13 00:28:59.562956 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:28:59.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.563061 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:28:59.564270 systemd[1]: Stopped target initrd.target. May 13 00:28:59.565529 systemd[1]: Stopped target basic.target. May 13 00:28:59.566696 systemd[1]: Stopped target ignition-complete.target. May 13 00:28:59.567993 systemd[1]: Stopped target ignition-diskful.target. May 13 00:28:59.569235 systemd[1]: Stopped target initrd-root-device.target. May 13 00:28:59.570632 systemd[1]: Stopped target remote-fs.target. May 13 00:28:59.571958 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:28:59.573311 systemd[1]: Stopped target sysinit.target. May 13 00:28:59.574527 systemd[1]: Stopped target local-fs.target. May 13 00:28:59.575769 systemd[1]: Stopped target local-fs-pre.target. May 13 00:28:59.576998 systemd[1]: Stopped target swap.target. May 13 00:28:59.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.578137 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:28:59.578238 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:28:59.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.579496 systemd[1]: Stopped target cryptsetup.target. May 13 00:28:59.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.580595 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:28:59.580694 systemd[1]: Stopped dracut-initqueue.service. May 13 00:28:59.582107 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:28:59.582201 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:28:59.583411 systemd[1]: Stopped target paths.target. May 13 00:28:59.584521 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:28:59.590541 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:28:59.591418 systemd[1]: Stopped target slices.target. May 13 00:28:59.592723 systemd[1]: Stopped target sockets.target. May 13 00:28:59.593890 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:28:59.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.593995 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:28:59.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.595299 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:28:59.595397 systemd[1]: Stopped ignition-files.service. May 13 00:28:59.599668 iscsid[739]: iscsid shutting down. May 13 00:28:59.597618 systemd[1]: Stopping ignition-mount.service... May 13 00:28:59.601207 systemd[1]: Stopping iscsid.service... May 13 00:28:59.601792 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:28:59.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.601914 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:28:59.606156 ignition[892]: INFO : Ignition 2.14.0 May 13 00:28:59.606156 ignition[892]: INFO : Stage: umount May 13 00:28:59.606156 ignition[892]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:28:59.606156 ignition[892]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:28:59.606156 ignition[892]: INFO : umount: umount passed May 13 00:28:59.606156 ignition[892]: INFO : Ignition finished successfully May 13 00:28:59.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.603806 systemd[1]: Stopping sysroot-boot.service... May 13 00:28:59.605497 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:28:59.605670 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:28:59.607000 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:28:59.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.607100 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:28:59.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.609650 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:28:59.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.609745 systemd[1]: Stopped iscsid.service. May 13 00:28:59.611893 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:28:59.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.611973 systemd[1]: Stopped ignition-mount.service. May 13 00:28:59.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.613989 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:28:59.614495 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:28:59.614697 systemd[1]: Closed iscsid.socket. May 13 00:28:59.616137 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:28:59.616182 systemd[1]: Stopped ignition-disks.service. May 13 00:28:59.617540 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:28:59.617585 systemd[1]: Stopped ignition-kargs.service. May 13 00:28:59.619138 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:28:59.619180 systemd[1]: Stopped ignition-setup.service. May 13 00:28:59.620978 systemd[1]: Stopping iscsiuio.service... May 13 00:28:59.621920 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:28:59.622012 systemd[1]: Finished initrd-cleanup.service. May 13 00:28:59.623099 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:28:59.623197 systemd[1]: Stopped iscsiuio.service. May 13 00:28:59.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.624928 systemd[1]: Stopped target network.target. May 13 00:28:59.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.626430 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:28:59.626472 systemd[1]: Closed iscsiuio.socket. May 13 00:28:59.627783 systemd[1]: Stopping systemd-networkd.service... May 13 00:28:59.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.629737 systemd[1]: Stopping systemd-resolved.service... May 13 00:28:59.645000 audit: BPF prog-id=6 op=UNLOAD May 13 00:28:59.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.637165 systemd-networkd[734]: eth0: DHCPv6 lease lost May 13 00:28:59.646000 audit: BPF prog-id=9 op=UNLOAD May 13 00:28:59.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.638183 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:28:59.638284 systemd[1]: Stopped systemd-networkd.service. May 13 00:28:59.640002 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:28:59.640084 systemd[1]: Stopped systemd-resolved.service. May 13 00:28:59.641262 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:28:59.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.641291 systemd[1]: Closed systemd-networkd.socket. May 13 00:28:59.642902 systemd[1]: Stopping network-cleanup.service... May 13 00:28:59.643567 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:28:59.643625 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:28:59.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.644914 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:28:59.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.644956 systemd[1]: Stopped systemd-sysctl.service. May 13 00:28:59.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.646968 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:28:59.647010 systemd[1]: Stopped systemd-modules-load.service. May 13 00:28:59.648057 systemd[1]: Stopping systemd-udevd.service... May 13 00:28:59.653885 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:28:59.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.654342 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:28:59.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.654456 systemd[1]: Stopped systemd-udevd.service. May 13 00:28:59.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.656019 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:28:59.656059 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:28:59.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:28:59.657450 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:28:59.657484 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:28:59.658822 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:28:59.658866 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:28:59.660302 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:28:59.660349 systemd[1]: Stopped dracut-cmdline.service. May 13 00:28:59.661566 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:28:59.661604 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:28:59.663620 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:28:59.665236 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:28:59.665286 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:28:59.666932 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:28:59.667017 systemd[1]: Stopped sysroot-boot.service. May 13 00:28:59.668008 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:28:59.668083 systemd[1]: Stopped network-cleanup.service. May 13 00:28:59.669573 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:28:59.669636 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:28:59.671013 systemd[1]: Reached target initrd-switch-root.target. May 13 00:28:59.672147 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:28:59.672193 systemd[1]: Stopped initrd-setup-root.service. May 13 00:28:59.674202 systemd[1]: Starting initrd-switch-root.service... May 13 00:28:59.680040 systemd[1]: Switching root. May 13 00:28:59.697904 systemd-journald[291]: Journal stopped May 13 00:29:01.660194 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). May 13 00:29:01.660253 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:29:01.660271 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:29:01.660281 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:29:01.660293 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:29:01.660303 kernel: SELinux: policy capability open_perms=1 May 13 00:29:01.660312 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:29:01.660333 kernel: SELinux: policy capability always_check_network=0 May 13 00:29:01.660350 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:29:01.660360 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:29:01.660370 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:29:01.660380 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:29:01.660390 systemd[1]: Successfully loaded SELinux policy in 33.712ms. May 13 00:29:01.660412 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.811ms. May 13 00:29:01.660424 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:29:01.660435 systemd[1]: Detected virtualization kvm. May 13 00:29:01.660445 systemd[1]: Detected architecture arm64. May 13 00:29:01.660456 systemd[1]: Detected first boot. May 13 00:29:01.660466 systemd[1]: Initializing machine ID from VM UUID. May 13 00:29:01.660477 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:29:01.660489 systemd[1]: Populated /etc with preset unit settings. May 13 00:29:01.660499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:29:01.660537 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:29:01.660551 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:29:01.660562 kernel: kauditd_printk_skb: 80 callbacks suppressed May 13 00:29:01.660571 kernel: audit: type=1334 audit(1747096141.518:84): prog-id=12 op=LOAD May 13 00:29:01.660581 kernel: audit: type=1334 audit(1747096141.518:85): prog-id=3 op=UNLOAD May 13 00:29:01.660590 kernel: audit: type=1334 audit(1747096141.521:86): prog-id=13 op=LOAD May 13 00:29:01.660602 kernel: audit: type=1334 audit(1747096141.521:87): prog-id=14 op=LOAD May 13 00:29:01.660612 kernel: audit: type=1334 audit(1747096141.521:88): prog-id=4 op=UNLOAD May 13 00:29:01.660622 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:29:01.660632 kernel: audit: type=1334 audit(1747096141.521:89): prog-id=5 op=UNLOAD May 13 00:29:01.660644 systemd[1]: Stopped initrd-switch-root.service. May 13 00:29:01.660655 kernel: audit: type=1131 audit(1747096141.522:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.660668 kernel: audit: type=1130 audit(1747096141.528:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.660678 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:29:01.660689 kernel: audit: type=1131 audit(1747096141.528:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.660701 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:29:01.660713 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:29:01.660723 systemd[1]: Created slice system-getty.slice. May 13 00:29:01.660734 systemd[1]: Created slice system-modprobe.slice. May 13 00:29:01.660744 kernel: audit: type=1334 audit(1747096141.541:93): prog-id=12 op=UNLOAD May 13 00:29:01.660755 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:29:01.660767 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:29:01.660777 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:29:01.660788 systemd[1]: Created slice user.slice. May 13 00:29:01.660798 systemd[1]: Started systemd-ask-password-console.path. May 13 00:29:01.660809 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:29:01.660819 systemd[1]: Set up automount boot.automount. May 13 00:29:01.660830 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:29:01.660842 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:29:01.660853 systemd[1]: Stopped target initrd-fs.target. May 13 00:29:01.660863 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:29:01.660874 systemd[1]: Reached target integritysetup.target. May 13 00:29:01.660884 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:29:01.660895 systemd[1]: Reached target remote-fs.target. May 13 00:29:01.660906 systemd[1]: Reached target slices.target. May 13 00:29:01.660917 systemd[1]: Reached target swap.target. May 13 00:29:01.660928 systemd[1]: Reached target torcx.target. May 13 00:29:01.660940 systemd[1]: Reached target veritysetup.target. May 13 00:29:01.660951 systemd[1]: Listening on systemd-coredump.socket. May 13 00:29:01.660961 systemd[1]: Listening on systemd-initctl.socket. May 13 00:29:01.660971 systemd[1]: Listening on systemd-networkd.socket. May 13 00:29:01.660981 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:29:01.660992 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:29:01.661003 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:29:01.661013 systemd[1]: Mounting dev-hugepages.mount... May 13 00:29:01.661023 systemd[1]: Mounting dev-mqueue.mount... May 13 00:29:01.661034 systemd[1]: Mounting media.mount... May 13 00:29:01.661049 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:29:01.661059 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:29:01.661069 systemd[1]: Mounting tmp.mount... May 13 00:29:01.661079 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:29:01.661090 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:29:01.661100 systemd[1]: Starting kmod-static-nodes.service... May 13 00:29:01.661111 systemd[1]: Starting modprobe@configfs.service... May 13 00:29:01.661122 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:29:01.661132 systemd[1]: Starting modprobe@drm.service... May 13 00:29:01.661144 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:29:01.661154 systemd[1]: Starting modprobe@fuse.service... May 13 00:29:01.661165 systemd[1]: Starting modprobe@loop.service... May 13 00:29:01.661176 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:29:01.661187 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:29:01.661200 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:29:01.661212 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:29:01.661222 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:29:01.661234 systemd[1]: Stopped systemd-journald.service. May 13 00:29:01.661244 kernel: loop: module loaded May 13 00:29:01.661254 systemd[1]: Starting systemd-journald.service... May 13 00:29:01.661264 systemd[1]: Starting systemd-modules-load.service... May 13 00:29:01.661275 systemd[1]: Starting systemd-network-generator.service... May 13 00:29:01.661285 kernel: fuse: init (API version 7.34) May 13 00:29:01.661295 systemd[1]: Starting systemd-remount-fs.service... May 13 00:29:01.661305 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:29:01.661315 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:29:01.661332 systemd[1]: Stopped verity-setup.service. May 13 00:29:01.661345 systemd[1]: Mounted dev-hugepages.mount. May 13 00:29:01.661355 systemd[1]: Mounted dev-mqueue.mount. May 13 00:29:01.661365 systemd[1]: Mounted media.mount. May 13 00:29:01.661376 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:29:01.661386 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:29:01.661398 systemd-journald[988]: Journal started May 13 00:29:01.661441 systemd-journald[988]: Runtime Journal (/run/log/journal/96b125b08e43491cb1a2af1dea6f0075) is 6.0M, max 48.7M, 42.6M free. May 13 00:28:59.755000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:28:59.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:28:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:28:59.831000 audit: BPF prog-id=10 op=LOAD May 13 00:28:59.831000 audit: BPF prog-id=10 op=UNLOAD May 13 00:28:59.831000 audit: BPF prog-id=11 op=LOAD May 13 00:28:59.831000 audit: BPF prog-id=11 op=UNLOAD May 13 00:28:59.869000 audit[925]: AVC avc: denied { associate } for pid=925 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:28:59.869000 audit[925]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=908 pid=925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:28:59.869000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:28:59.870000 audit[925]: AVC avc: denied { associate } for pid=925 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:28:59.870000 audit[925]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=908 pid=925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:28:59.870000 audit: CWD cwd="/" May 13 00:28:59.870000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:28:59.870000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:28:59.870000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:29:01.518000 audit: BPF prog-id=12 op=LOAD May 13 00:29:01.518000 audit: BPF prog-id=3 op=UNLOAD May 13 00:29:01.521000 audit: BPF prog-id=13 op=LOAD May 13 00:29:01.521000 audit: BPF prog-id=14 op=LOAD May 13 00:29:01.521000 audit: BPF prog-id=4 op=UNLOAD May 13 00:29:01.521000 audit: BPF prog-id=5 op=UNLOAD May 13 00:29:01.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.541000 audit: BPF prog-id=12 op=UNLOAD May 13 00:29:01.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.635000 audit: BPF prog-id=15 op=LOAD May 13 00:29:01.635000 audit: BPF prog-id=16 op=LOAD May 13 00:29:01.635000 audit: BPF prog-id=17 op=LOAD May 13 00:29:01.635000 audit: BPF prog-id=13 op=UNLOAD May 13 00:29:01.635000 audit: BPF prog-id=14 op=UNLOAD May 13 00:29:01.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.658000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:29:01.658000 audit[988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc2452230 a2=4000 a3=1 items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:01.658000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:29:01.517673 systemd[1]: Queued start job for default target multi-user.target. May 13 00:28:59.867728 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:29:01.662572 systemd[1]: Mounted tmp.mount. May 13 00:29:01.517684 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:28:59.867984 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:29:01.523072 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:28:59.868004 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:28:59.868032 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:28:59.868041 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:28:59.868067 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:28:59.868078 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:28:59.868262 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:28:59.868294 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:28:59.868305 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:28:59.868949 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:28:59.868983 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:28:59.869000 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:28:59.869013 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:28:59.869029 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:28:59.869042 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:28:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:29:01.276042 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:29:01.276293 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:29:01.276406 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:29:01.276578 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:29:01.276626 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:29:01.663983 systemd[1]: Started systemd-journald.service. May 13 00:29:01.276682 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-13T00:29:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:29:01.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.665615 systemd[1]: Finished kmod-static-nodes.service. May 13 00:29:01.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.666656 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:29:01.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.668625 systemd[1]: Finished modprobe@configfs.service. May 13 00:29:01.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.669725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:29:01.669885 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:29:01.670923 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:29:01.671077 systemd[1]: Finished modprobe@drm.service. May 13 00:29:01.672061 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:29:01.672200 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:29:01.673289 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:29:01.673798 systemd[1]: Finished modprobe@fuse.service. May 13 00:29:01.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.674803 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:29:01.674955 systemd[1]: Finished modprobe@loop.service. May 13 00:29:01.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.676218 systemd[1]: Finished systemd-modules-load.service. May 13 00:29:01.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.677590 systemd[1]: Finished systemd-network-generator.service. May 13 00:29:01.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.678764 systemd[1]: Finished systemd-remount-fs.service. May 13 00:29:01.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.680193 systemd[1]: Reached target network-pre.target. May 13 00:29:01.682311 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:29:01.684280 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:29:01.685033 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:29:01.686721 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:29:01.689157 systemd[1]: Starting systemd-journal-flush.service... May 13 00:29:01.690416 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:29:01.691658 systemd[1]: Starting systemd-random-seed.service... May 13 00:29:01.692864 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:29:01.696432 systemd-journald[988]: Time spent on flushing to /var/log/journal/96b125b08e43491cb1a2af1dea6f0075 is 13.440ms for 983 entries. May 13 00:29:01.696432 systemd-journald[988]: System Journal (/var/log/journal/96b125b08e43491cb1a2af1dea6f0075) is 8.0M, max 195.6M, 187.6M free. May 13 00:29:01.717673 systemd-journald[988]: Received client request to flush runtime journal. May 13 00:29:01.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.695722 systemd[1]: Starting systemd-sysctl.service... May 13 00:29:01.699909 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:29:01.701070 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:29:01.702131 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:29:01.705686 systemd[1]: Finished systemd-random-seed.service. May 13 00:29:01.706912 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:29:01.708013 systemd[1]: Finished systemd-sysctl.service. May 13 00:29:01.708973 systemd[1]: Reached target first-boot-complete.target. May 13 00:29:01.710836 systemd[1]: Starting systemd-sysusers.service... May 13 00:29:01.712660 systemd[1]: Starting systemd-udev-settle.service... May 13 00:29:01.719281 systemd[1]: Finished systemd-journal-flush.service. May 13 00:29:01.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:01.721241 udevadm[1026]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:29:01.730273 systemd[1]: Finished systemd-sysusers.service. May 13 00:29:01.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.045884 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:29:02.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.046000 audit: BPF prog-id=18 op=LOAD May 13 00:29:02.046000 audit: BPF prog-id=19 op=LOAD May 13 00:29:02.046000 audit: BPF prog-id=7 op=UNLOAD May 13 00:29:02.046000 audit: BPF prog-id=8 op=UNLOAD May 13 00:29:02.047984 systemd[1]: Starting systemd-udevd.service... May 13 00:29:02.067767 systemd-udevd[1028]: Using default interface naming scheme 'v252'. May 13 00:29:02.080942 systemd[1]: Started systemd-udevd.service. May 13 00:29:02.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.082000 audit: BPF prog-id=20 op=LOAD May 13 00:29:02.083116 systemd[1]: Starting systemd-networkd.service... May 13 00:29:02.088000 audit: BPF prog-id=21 op=LOAD May 13 00:29:02.088000 audit: BPF prog-id=22 op=LOAD May 13 00:29:02.088000 audit: BPF prog-id=23 op=LOAD May 13 00:29:02.089976 systemd[1]: Starting systemd-userdbd.service... May 13 00:29:02.102536 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 13 00:29:02.119757 systemd[1]: Started systemd-userdbd.service. May 13 00:29:02.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.144713 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:29:02.182920 systemd-networkd[1036]: lo: Link UP May 13 00:29:02.182932 systemd-networkd[1036]: lo: Gained carrier May 13 00:29:02.183247 systemd-networkd[1036]: Enumeration completed May 13 00:29:02.183347 systemd[1]: Started systemd-networkd.service. May 13 00:29:02.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.184370 systemd-networkd[1036]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:29:02.187271 systemd-networkd[1036]: eth0: Link UP May 13 00:29:02.187278 systemd-networkd[1036]: eth0: Gained carrier May 13 00:29:02.191858 systemd[1]: Finished systemd-udev-settle.service. May 13 00:29:02.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.193783 systemd[1]: Starting lvm2-activation-early.service... May 13 00:29:02.203523 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:29:02.205647 systemd-networkd[1036]: eth0: DHCPv4 address 10.0.0.75/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:29:02.231245 systemd[1]: Finished lvm2-activation-early.service. May 13 00:29:02.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.232200 systemd[1]: Reached target cryptsetup.target. May 13 00:29:02.233954 systemd[1]: Starting lvm2-activation.service... May 13 00:29:02.237351 lvm[1062]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:29:02.265270 systemd[1]: Finished lvm2-activation.service. May 13 00:29:02.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.266124 systemd[1]: Reached target local-fs-pre.target. May 13 00:29:02.266901 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:29:02.266927 systemd[1]: Reached target local-fs.target. May 13 00:29:02.267625 systemd[1]: Reached target machines.target. May 13 00:29:02.269288 systemd[1]: Starting ldconfig.service... May 13 00:29:02.270246 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:29:02.270295 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.271257 systemd[1]: Starting systemd-boot-update.service... May 13 00:29:02.273080 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:29:02.275108 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:29:02.278005 systemd[1]: Starting systemd-sysext.service... May 13 00:29:02.279031 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1064 (bootctl) May 13 00:29:02.280087 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:29:02.284132 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:29:02.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.288687 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:29:02.295646 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:29:02.295833 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:29:02.339526 kernel: loop0: detected capacity change from 0 to 194096 May 13 00:29:02.344813 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:29:02.346818 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:29:02.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.351524 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:29:02.353819 systemd-fsck[1072]: fsck.fat 4.2 (2021-01-31) May 13 00:29:02.353819 systemd-fsck[1072]: /dev/vda1: 236 files, 117310/258078 clusters May 13 00:29:02.356022 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:29:02.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.358662 systemd[1]: Mounting boot.mount... May 13 00:29:02.366224 systemd[1]: Mounted boot.mount. May 13 00:29:02.369536 kernel: loop1: detected capacity change from 0 to 194096 May 13 00:29:02.375281 systemd[1]: Finished systemd-boot-update.service. May 13 00:29:02.375611 (sd-sysext)[1082]: Using extensions 'kubernetes'. May 13 00:29:02.376071 (sd-sysext)[1082]: Merged extensions into '/usr'. May 13 00:29:02.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.394773 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:29:02.396147 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:29:02.398001 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:29:02.400021 systemd[1]: Starting modprobe@loop.service... May 13 00:29:02.401002 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:29:02.401127 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.401897 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:29:02.402017 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:29:02.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.403344 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:29:02.403460 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:29:02.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.404912 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:29:02.405019 systemd[1]: Finished modprobe@loop.service. May 13 00:29:02.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.406357 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:29:02.406458 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:29:02.438906 ldconfig[1063]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:29:02.443348 systemd[1]: Finished ldconfig.service. May 13 00:29:02.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.655769 systemd[1]: Mounting usr-share-oem.mount... May 13 00:29:02.660710 systemd[1]: Mounted usr-share-oem.mount. May 13 00:29:02.662489 systemd[1]: Finished systemd-sysext.service. May 13 00:29:02.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.664497 systemd[1]: Starting ensure-sysext.service... May 13 00:29:02.666159 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:29:02.670612 systemd[1]: Reloading. May 13 00:29:02.681390 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:29:02.683465 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:29:02.686155 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:29:02.707481 /usr/lib/systemd/system-generators/torcx-generator[1109]: time="2025-05-13T00:29:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:29:02.707523 /usr/lib/systemd/system-generators/torcx-generator[1109]: time="2025-05-13T00:29:02Z" level=info msg="torcx already run" May 13 00:29:02.775560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:29:02.775579 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:29:02.790598 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:29:02.831000 audit: BPF prog-id=24 op=LOAD May 13 00:29:02.831000 audit: BPF prog-id=25 op=LOAD May 13 00:29:02.831000 audit: BPF prog-id=18 op=UNLOAD May 13 00:29:02.831000 audit: BPF prog-id=19 op=UNLOAD May 13 00:29:02.832000 audit: BPF prog-id=26 op=LOAD May 13 00:29:02.832000 audit: BPF prog-id=20 op=UNLOAD May 13 00:29:02.834000 audit: BPF prog-id=27 op=LOAD May 13 00:29:02.834000 audit: BPF prog-id=21 op=UNLOAD May 13 00:29:02.834000 audit: BPF prog-id=28 op=LOAD May 13 00:29:02.834000 audit: BPF prog-id=29 op=LOAD May 13 00:29:02.834000 audit: BPF prog-id=22 op=UNLOAD May 13 00:29:02.834000 audit: BPF prog-id=23 op=UNLOAD May 13 00:29:02.835000 audit: BPF prog-id=30 op=LOAD May 13 00:29:02.835000 audit: BPF prog-id=15 op=UNLOAD May 13 00:29:02.835000 audit: BPF prog-id=31 op=LOAD May 13 00:29:02.835000 audit: BPF prog-id=32 op=LOAD May 13 00:29:02.835000 audit: BPF prog-id=16 op=UNLOAD May 13 00:29:02.835000 audit: BPF prog-id=17 op=UNLOAD May 13 00:29:02.837289 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:29:02.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.841419 systemd[1]: Starting audit-rules.service... May 13 00:29:02.843159 systemd[1]: Starting clean-ca-certificates.service... May 13 00:29:02.845059 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:29:02.846000 audit: BPF prog-id=33 op=LOAD May 13 00:29:02.847758 systemd[1]: Starting systemd-resolved.service... May 13 00:29:02.849000 audit: BPF prog-id=34 op=LOAD May 13 00:29:02.851232 systemd[1]: Starting systemd-timesyncd.service... May 13 00:29:02.852938 systemd[1]: Starting systemd-update-utmp.service... May 13 00:29:02.856830 systemd[1]: Finished clean-ca-certificates.service. May 13 00:29:02.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.858025 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:29:02.858000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:29:02.861148 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:29:02.862478 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:29:02.864356 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:29:02.866209 systemd[1]: Starting modprobe@loop.service... May 13 00:29:02.867100 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:29:02.867289 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.867462 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:29:02.868790 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:29:02.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.870237 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:29:02.870354 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:29:02.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.871615 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:29:02.871716 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:29:02.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.873085 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:29:02.873190 systemd[1]: Finished modprobe@loop.service. May 13 00:29:02.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.875889 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:29:02.877100 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:29:02.879131 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:29:02.881133 systemd[1]: Starting modprobe@loop.service... May 13 00:29:02.881903 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:29:02.882019 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.883180 systemd[1]: Starting systemd-update-done.service... May 13 00:29:02.884115 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:29:02.885029 systemd[1]: Finished systemd-update-utmp.service. May 13 00:29:02.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.886240 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:29:02.886361 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:29:02.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.887559 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:29:02.887668 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:29:02.888895 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:29:02.889003 systemd[1]: Finished modprobe@loop.service. May 13 00:29:02.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.890297 systemd[1]: Finished systemd-update-done.service. May 13 00:29:02.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.894111 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:29:02.895391 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:29:02.897295 systemd[1]: Starting modprobe@drm.service... May 13 00:29:02.899170 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:29:02.901078 systemd[1]: Starting modprobe@loop.service... May 13 00:29:02.901899 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:29:02.902018 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.903115 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:29:02.904142 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:29:02.905100 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:29:02.905209 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:29:02.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:02.907767 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:29:02.907000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:29:02.907000 audit[1175]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb84e560 a2=420 a3=0 items=0 ppid=1147 pid=1175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:02.907000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:29:02.908043 augenrules[1175]: No rules May 13 00:29:02.907877 systemd[1]: Finished modprobe@drm.service. May 13 00:29:02.909726 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:29:02.909831 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:29:02.913662 systemd[1]: Finished audit-rules.service. May 13 00:29:02.914781 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:29:02.914889 systemd[1]: Finished modprobe@loop.service. May 13 00:29:02.916241 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:29:02.916310 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:29:02.917218 systemd[1]: Finished ensure-sysext.service. May 13 00:29:02.919730 systemd-resolved[1151]: Positive Trust Anchors: May 13 00:29:02.919741 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:29:02.919768 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:29:02.922193 systemd[1]: Started systemd-timesyncd.service. May 13 00:29:02.923288 systemd[1]: Reached target time-set.target. May 13 00:29:02.925218 systemd-timesyncd[1157]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:29:02.925323 systemd-timesyncd[1157]: Initial clock synchronization to Tue 2025-05-13 00:29:02.883349 UTC. May 13 00:29:02.928297 systemd-resolved[1151]: Defaulting to hostname 'linux'. May 13 00:29:02.929626 systemd[1]: Started systemd-resolved.service. May 13 00:29:02.930462 systemd[1]: Reached target network.target. May 13 00:29:02.931209 systemd[1]: Reached target nss-lookup.target. May 13 00:29:02.932002 systemd[1]: Reached target sysinit.target. May 13 00:29:02.932865 systemd[1]: Started motdgen.path. May 13 00:29:02.933526 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:29:02.934669 systemd[1]: Started logrotate.timer. May 13 00:29:02.935468 systemd[1]: Started mdadm.timer. May 13 00:29:02.936119 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:29:02.937005 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:29:02.937032 systemd[1]: Reached target paths.target. May 13 00:29:02.937763 systemd[1]: Reached target timers.target. May 13 00:29:02.938801 systemd[1]: Listening on dbus.socket. May 13 00:29:02.940424 systemd[1]: Starting docker.socket... May 13 00:29:02.943406 systemd[1]: Listening on sshd.socket. May 13 00:29:02.944300 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.944725 systemd[1]: Listening on docker.socket. May 13 00:29:02.945546 systemd[1]: Reached target sockets.target. May 13 00:29:02.946242 systemd[1]: Reached target basic.target. May 13 00:29:02.946991 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:29:02.947024 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:29:02.947944 systemd[1]: Starting containerd.service... May 13 00:29:02.949661 systemd[1]: Starting dbus.service... May 13 00:29:02.951293 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:29:02.953148 systemd[1]: Starting extend-filesystems.service... May 13 00:29:02.954081 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:29:02.955385 systemd[1]: Starting motdgen.service... May 13 00:29:02.957264 systemd[1]: Starting prepare-helm.service... May 13 00:29:02.959762 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:29:02.961780 systemd[1]: Starting sshd-keygen.service... May 13 00:29:02.966150 jq[1189]: false May 13 00:29:02.964828 systemd[1]: Starting systemd-logind.service... May 13 00:29:02.965745 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:29:02.965835 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:29:02.966212 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:29:02.966994 systemd[1]: Starting update-engine.service... May 13 00:29:02.969220 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:29:02.971869 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:29:02.972035 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:29:02.972304 jq[1204]: true May 13 00:29:02.974859 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:29:02.975023 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:29:02.985621 extend-filesystems[1190]: Found loop1 May 13 00:29:02.986824 extend-filesystems[1190]: Found vda May 13 00:29:02.987644 extend-filesystems[1190]: Found vda1 May 13 00:29:02.988385 extend-filesystems[1190]: Found vda2 May 13 00:29:02.989594 tar[1207]: linux-arm64/helm May 13 00:29:02.989840 jq[1212]: true May 13 00:29:02.990667 extend-filesystems[1190]: Found vda3 May 13 00:29:02.991461 extend-filesystems[1190]: Found usr May 13 00:29:02.992056 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:29:02.992213 systemd[1]: Finished motdgen.service. May 13 00:29:02.993097 extend-filesystems[1190]: Found vda4 May 13 00:29:02.993980 extend-filesystems[1190]: Found vda6 May 13 00:29:02.996364 extend-filesystems[1190]: Found vda7 May 13 00:29:02.997286 extend-filesystems[1190]: Found vda9 May 13 00:29:02.998523 extend-filesystems[1190]: Checking size of /dev/vda9 May 13 00:29:03.005249 dbus-daemon[1188]: [system] SELinux support is enabled May 13 00:29:03.005436 systemd[1]: Started dbus.service. May 13 00:29:03.008122 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:29:03.008146 systemd[1]: Reached target system-config.target. May 13 00:29:03.009025 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:29:03.009044 systemd[1]: Reached target user-config.target. May 13 00:29:03.023176 extend-filesystems[1190]: Resized partition /dev/vda9 May 13 00:29:03.029074 extend-filesystems[1238]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:29:03.036113 systemd-logind[1200]: Watching system buttons on /dev/input/event0 (Power Button) May 13 00:29:03.037937 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:29:03.039793 bash[1235]: Updated "/home/core/.ssh/authorized_keys" May 13 00:29:03.038824 systemd-logind[1200]: New seat seat0. May 13 00:29:03.039295 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:29:03.042947 systemd[1]: Started systemd-logind.service. May 13 00:29:03.046662 update_engine[1203]: I0513 00:29:03.046406 1203 main.cc:92] Flatcar Update Engine starting May 13 00:29:03.055588 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:29:03.056766 systemd[1]: Started update-engine.service. May 13 00:29:03.066692 update_engine[1203]: I0513 00:29:03.056787 1203 update_check_scheduler.cc:74] Next update check in 4m24s May 13 00:29:03.059272 systemd[1]: Started locksmithd.service. May 13 00:29:03.068339 extend-filesystems[1238]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:29:03.068339 extend-filesystems[1238]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:29:03.068339 extend-filesystems[1238]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:29:03.075590 extend-filesystems[1190]: Resized filesystem in /dev/vda9 May 13 00:29:03.070129 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:29:03.070301 systemd[1]: Finished extend-filesystems.service. May 13 00:29:03.095652 env[1213]: time="2025-05-13T00:29:03.095600884Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:29:03.112652 env[1213]: time="2025-05-13T00:29:03.112610005Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:29:03.112770 env[1213]: time="2025-05-13T00:29:03.112748522Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.113998 env[1213]: time="2025-05-13T00:29:03.113965813Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:29:03.113998 env[1213]: time="2025-05-13T00:29:03.113995934Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.114225 env[1213]: time="2025-05-13T00:29:03.114199680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:29:03.114225 env[1213]: time="2025-05-13T00:29:03.114222740Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.114295 env[1213]: time="2025-05-13T00:29:03.114236783Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:29:03.114295 env[1213]: time="2025-05-13T00:29:03.114246159Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.114335 env[1213]: time="2025-05-13T00:29:03.114316016Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.114563 env[1213]: time="2025-05-13T00:29:03.114539470Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:29:03.114682 env[1213]: time="2025-05-13T00:29:03.114660673Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:29:03.114682 env[1213]: time="2025-05-13T00:29:03.114680261Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:29:03.114749 env[1213]: time="2025-05-13T00:29:03.114732963Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:29:03.114785 env[1213]: time="2025-05-13T00:29:03.114748243Z" level=info msg="metadata content store policy set" policy=shared May 13 00:29:03.118837 env[1213]: time="2025-05-13T00:29:03.118801266Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:29:03.118892 env[1213]: time="2025-05-13T00:29:03.118841081Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:29:03.118892 env[1213]: time="2025-05-13T00:29:03.118856162Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:29:03.118950 env[1213]: time="2025-05-13T00:29:03.118886562Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:29:03.118950 env[1213]: time="2025-05-13T00:29:03.118909861Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:29:03.118950 env[1213]: time="2025-05-13T00:29:03.118924184Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:29:03.118950 env[1213]: time="2025-05-13T00:29:03.118936551Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119326 env[1213]: time="2025-05-13T00:29:03.119301515Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119361 env[1213]: time="2025-05-13T00:29:03.119327806Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119361 env[1213]: time="2025-05-13T00:29:03.119354417Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119407 env[1213]: time="2025-05-13T00:29:03.119368061Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119407 env[1213]: time="2025-05-13T00:29:03.119379750Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:29:03.119540 env[1213]: time="2025-05-13T00:29:03.119521100Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:29:03.119644 env[1213]: time="2025-05-13T00:29:03.119624908Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:29:03.119887 env[1213]: time="2025-05-13T00:29:03.119868789Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:29:03.119921 env[1213]: time="2025-05-13T00:29:03.119898431Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:29:03.119921 env[1213]: time="2025-05-13T00:29:03.119912355Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:29:03.120103 env[1213]: time="2025-05-13T00:29:03.120085302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120134 env[1213]: time="2025-05-13T00:29:03.120105369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120134 env[1213]: time="2025-05-13T00:29:03.120118295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120134 env[1213]: time="2025-05-13T00:29:03.120130583Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120190 env[1213]: time="2025-05-13T00:29:03.120142951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120190 env[1213]: time="2025-05-13T00:29:03.120155438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120319 env[1213]: time="2025-05-13T00:29:03.120303889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120351 env[1213]: time="2025-05-13T00:29:03.120320286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120351 env[1213]: time="2025-05-13T00:29:03.120336045Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:29:03.120481 env[1213]: time="2025-05-13T00:29:03.120460998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120526 env[1213]: time="2025-05-13T00:29:03.120483259Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120526 env[1213]: time="2025-05-13T00:29:03.120496425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120526 env[1213]: time="2025-05-13T00:29:03.120518806Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:29:03.120586 env[1213]: time="2025-05-13T00:29:03.120535602Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:29:03.120586 env[1213]: time="2025-05-13T00:29:03.120546534Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:29:03.120586 env[1213]: time="2025-05-13T00:29:03.120565404Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:29:03.120650 env[1213]: time="2025-05-13T00:29:03.120603624Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:29:03.120852 env[1213]: time="2025-05-13T00:29:03.120800867Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:29:03.121464 env[1213]: time="2025-05-13T00:29:03.120866256Z" level=info msg="Connect containerd service" May 13 00:29:03.121464 env[1213]: time="2025-05-13T00:29:03.120898292Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:29:03.122006 env[1213]: time="2025-05-13T00:29:03.121966334Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:29:03.122240 env[1213]: time="2025-05-13T00:29:03.122198885Z" level=info msg="Start subscribing containerd event" May 13 00:29:03.122272 env[1213]: time="2025-05-13T00:29:03.122255217Z" level=info msg="Start recovering state" May 13 00:29:03.122337 env[1213]: time="2025-05-13T00:29:03.122323638Z" level=info msg="Start event monitor" May 13 00:29:03.122363 env[1213]: time="2025-05-13T00:29:03.122349171Z" level=info msg="Start snapshots syncer" May 13 00:29:03.122363 env[1213]: time="2025-05-13T00:29:03.122359464Z" level=info msg="Start cni network conf syncer for default" May 13 00:29:03.122401 env[1213]: time="2025-05-13T00:29:03.122367004Z" level=info msg="Start streaming server" May 13 00:29:03.122475 env[1213]: time="2025-05-13T00:29:03.122400557Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:29:03.122548 env[1213]: time="2025-05-13T00:29:03.122532730Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:29:03.123234 systemd[1]: Started containerd.service. May 13 00:29:03.124235 env[1213]: time="2025-05-13T00:29:03.124200641Z" level=info msg="containerd successfully booted in 0.031186s" May 13 00:29:03.131656 locksmithd[1240]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:29:03.361937 tar[1207]: linux-arm64/LICENSE May 13 00:29:03.362048 tar[1207]: linux-arm64/README.md May 13 00:29:03.366361 systemd[1]: Finished prepare-helm.service. May 13 00:29:03.437713 systemd-networkd[1036]: eth0: Gained IPv6LL May 13 00:29:03.439619 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:29:03.440777 systemd[1]: Reached target network-online.target. May 13 00:29:03.443021 systemd[1]: Starting kubelet.service... May 13 00:29:03.977347 systemd[1]: Started kubelet.service. May 13 00:29:04.337922 sshd_keygen[1206]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:29:04.355708 systemd[1]: Finished sshd-keygen.service. May 13 00:29:04.358140 systemd[1]: Starting issuegen.service... May 13 00:29:04.363601 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:29:04.363761 systemd[1]: Finished issuegen.service. May 13 00:29:04.366090 systemd[1]: Starting systemd-user-sessions.service... May 13 00:29:04.372926 systemd[1]: Finished systemd-user-sessions.service. May 13 00:29:04.375413 systemd[1]: Started getty@tty1.service. May 13 00:29:04.378077 systemd[1]: Started serial-getty@ttyAMA0.service. May 13 00:29:04.379262 systemd[1]: Reached target getty.target. May 13 00:29:04.380252 systemd[1]: Reached target multi-user.target. May 13 00:29:04.382618 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:29:04.390754 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:29:04.390935 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:29:04.392153 systemd[1]: Startup finished in 623ms (kernel) + 4.137s (initrd) + 4.672s (userspace) = 9.433s. May 13 00:29:04.518888 kubelet[1256]: E0513 00:29:04.518836 1256 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:29:04.520796 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:29:04.520922 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:29:08.725038 systemd[1]: Created slice system-sshd.slice. May 13 00:29:08.726100 systemd[1]: Started sshd@0-10.0.0.75:22-10.0.0.1:57848.service. May 13 00:29:08.810633 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 57848 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:08.814558 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:08.824299 systemd-logind[1200]: New session 1 of user core. May 13 00:29:08.825214 systemd[1]: Created slice user-500.slice. May 13 00:29:08.826384 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:29:08.834904 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:29:08.836466 systemd[1]: Starting user@500.service... May 13 00:29:08.840893 (systemd)[1282]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:08.926416 systemd[1282]: Queued start job for default target default.target. May 13 00:29:08.926921 systemd[1282]: Reached target paths.target. May 13 00:29:08.926952 systemd[1282]: Reached target sockets.target. May 13 00:29:08.926972 systemd[1282]: Reached target timers.target. May 13 00:29:08.926984 systemd[1282]: Reached target basic.target. May 13 00:29:08.927029 systemd[1282]: Reached target default.target. May 13 00:29:08.927053 systemd[1282]: Startup finished in 75ms. May 13 00:29:08.927116 systemd[1]: Started user@500.service. May 13 00:29:08.928168 systemd[1]: Started session-1.scope. May 13 00:29:08.980892 systemd[1]: Started sshd@1-10.0.0.75:22-10.0.0.1:57854.service. May 13 00:29:09.024413 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 57854 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.026102 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.030485 systemd-logind[1200]: New session 2 of user core. May 13 00:29:09.031214 systemd[1]: Started session-2.scope. May 13 00:29:09.088141 sshd[1291]: pam_unix(sshd:session): session closed for user core May 13 00:29:09.090755 systemd[1]: sshd@1-10.0.0.75:22-10.0.0.1:57854.service: Deactivated successfully. May 13 00:29:09.091355 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:29:09.091917 systemd-logind[1200]: Session 2 logged out. Waiting for processes to exit. May 13 00:29:09.092960 systemd[1]: Started sshd@2-10.0.0.75:22-10.0.0.1:57862.service. May 13 00:29:09.093938 systemd-logind[1200]: Removed session 2. May 13 00:29:09.128739 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 57862 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.129998 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.133382 systemd-logind[1200]: New session 3 of user core. May 13 00:29:09.134212 systemd[1]: Started session-3.scope. May 13 00:29:09.183662 sshd[1297]: pam_unix(sshd:session): session closed for user core May 13 00:29:09.187310 systemd[1]: sshd@2-10.0.0.75:22-10.0.0.1:57862.service: Deactivated successfully. May 13 00:29:09.187899 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:29:09.188396 systemd-logind[1200]: Session 3 logged out. Waiting for processes to exit. May 13 00:29:09.189572 systemd[1]: Started sshd@3-10.0.0.75:22-10.0.0.1:57868.service. May 13 00:29:09.190242 systemd-logind[1200]: Removed session 3. May 13 00:29:09.225127 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 57868 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.226404 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.229867 systemd-logind[1200]: New session 4 of user core. May 13 00:29:09.230713 systemd[1]: Started session-4.scope. May 13 00:29:09.283645 sshd[1303]: pam_unix(sshd:session): session closed for user core May 13 00:29:09.287627 systemd[1]: sshd@3-10.0.0.75:22-10.0.0.1:57868.service: Deactivated successfully. May 13 00:29:09.288264 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:29:09.288878 systemd-logind[1200]: Session 4 logged out. Waiting for processes to exit. May 13 00:29:09.290572 systemd[1]: Started sshd@4-10.0.0.75:22-10.0.0.1:57870.service. May 13 00:29:09.291390 systemd-logind[1200]: Removed session 4. May 13 00:29:09.324925 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 57870 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.326383 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.329607 systemd-logind[1200]: New session 5 of user core. May 13 00:29:09.331002 systemd[1]: Started session-5.scope. May 13 00:29:09.394446 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:29:09.394713 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:29:09.408719 dbus-daemon[1188]: avc: received setenforce notice (enforcing=1) May 13 00:29:09.410486 sudo[1312]: pam_unix(sudo:session): session closed for user root May 13 00:29:09.412548 sshd[1309]: pam_unix(sshd:session): session closed for user core May 13 00:29:09.416768 systemd[1]: sshd@4-10.0.0.75:22-10.0.0.1:57870.service: Deactivated successfully. May 13 00:29:09.417475 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:29:09.418184 systemd-logind[1200]: Session 5 logged out. Waiting for processes to exit. May 13 00:29:09.420039 systemd[1]: Started sshd@5-10.0.0.75:22-10.0.0.1:57880.service. May 13 00:29:09.420918 systemd-logind[1200]: Removed session 5. May 13 00:29:09.455394 sshd[1316]: Accepted publickey for core from 10.0.0.1 port 57880 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.457051 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.460346 systemd-logind[1200]: New session 6 of user core. May 13 00:29:09.461816 systemd[1]: Started session-6.scope. May 13 00:29:09.514615 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:29:09.514847 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:29:09.517657 sudo[1320]: pam_unix(sudo:session): session closed for user root May 13 00:29:09.522050 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:29:09.522268 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:29:09.531352 systemd[1]: Stopping audit-rules.service... May 13 00:29:09.530000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:29:09.533715 auditctl[1323]: No rules May 13 00:29:09.534483 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:29:09.534667 systemd[1]: Stopped audit-rules.service. May 13 00:29:09.535320 kernel: kauditd_printk_skb: 106 callbacks suppressed May 13 00:29:09.535374 kernel: audit: type=1305 audit(1747096149.530:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:29:09.530000 audit[1323]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffddf80c0 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.536131 systemd[1]: Starting audit-rules.service... May 13 00:29:09.539828 kernel: audit: type=1300 audit(1747096149.530:196): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffddf80c0 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.539898 kernel: audit: type=1327 audit(1747096149.530:196): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:29:09.530000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:29:09.543011 kernel: audit: type=1131 audit(1747096149.533:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.551807 augenrules[1340]: No rules May 13 00:29:09.552772 systemd[1]: Finished audit-rules.service. May 13 00:29:09.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.553967 sudo[1319]: pam_unix(sudo:session): session closed for user root May 13 00:29:09.552000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.558972 kernel: audit: type=1130 audit(1747096149.551:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.559017 kernel: audit: type=1106 audit(1747096149.552:199): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.552000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.559382 sshd[1316]: pam_unix(sshd:session): session closed for user core May 13 00:29:09.562313 kernel: audit: type=1104 audit(1747096149.552:200): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.562367 kernel: audit: type=1106 audit(1747096149.558:201): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.558000 audit[1316]: USER_END pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.562249 systemd[1]: sshd@5-10.0.0.75:22-10.0.0.1:57880.service: Deactivated successfully. May 13 00:29:09.562903 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:29:09.563479 systemd-logind[1200]: Session 6 logged out. Waiting for processes to exit. May 13 00:29:09.564567 systemd[1]: Started sshd@6-10.0.0.75:22-10.0.0.1:57896.service. May 13 00:29:09.565401 systemd-logind[1200]: Removed session 6. May 13 00:29:09.558000 audit[1316]: CRED_DISP pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.568766 kernel: audit: type=1104 audit(1747096149.558:202): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.568799 kernel: audit: type=1131 audit(1747096149.560:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.75:22-10.0.0.1:57880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.75:22-10.0.0.1:57880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.75:22-10.0.0.1:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:09.598000 audit[1346]: USER_ACCT pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.599271 sshd[1346]: Accepted publickey for core from 10.0.0.1 port 57896 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:29:09.599000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.600000 audit[1346]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff05894f0 a2=3 a3=1 items=0 ppid=1 pid=1346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:29:09.600842 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:29:09.604817 systemd-logind[1200]: New session 7 of user core. May 13 00:29:09.605268 systemd[1]: Started session-7.scope. May 13 00:29:09.608000 audit[1346]: USER_START pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.610000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:09.657000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.657000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.657870 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:29:09.658098 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:29:09.659000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:09.718165 systemd[1]: Starting docker.service... May 13 00:29:09.800841 env[1361]: time="2025-05-13T00:29:09.800728162Z" level=info msg="Starting up" May 13 00:29:09.803260 env[1361]: time="2025-05-13T00:29:09.803222449Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:29:09.803260 env[1361]: time="2025-05-13T00:29:09.803250639Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:29:09.803364 env[1361]: time="2025-05-13T00:29:09.803272680Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:29:09.803364 env[1361]: time="2025-05-13T00:29:09.803283221Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:29:09.807209 env[1361]: time="2025-05-13T00:29:09.807176063Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:29:09.807209 env[1361]: time="2025-05-13T00:29:09.807202337Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:29:09.807261 env[1361]: time="2025-05-13T00:29:09.807216312Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:29:09.807261 env[1361]: time="2025-05-13T00:29:09.807225455Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:29:09.887744 env[1361]: time="2025-05-13T00:29:09.887694373Z" level=info msg="Loading containers: start." May 13 00:29:09.933000 audit[1394]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.933000 audit[1394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc92b9ad0 a2=0 a3=1 items=0 ppid=1361 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.933000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:29:09.935000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.935000 audit[1396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff12945a0 a2=0 a3=1 items=0 ppid=1361 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:29:09.937000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.937000 audit[1398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe40f8830 a2=0 a3=1 items=0 ppid=1361 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:29:09.939000 audit[1400]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.939000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc7d20220 a2=0 a3=1 items=0 ppid=1361 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:29:09.941000 audit[1402]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.941000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf5fb1a0 a2=0 a3=1 items=0 ppid=1361 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:29:09.970000 audit[1407]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.970000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe0676ea0 a2=0 a3=1 items=0 ppid=1361 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:29:09.976000 audit[1409]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.976000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc13430c0 a2=0 a3=1 items=0 ppid=1361 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:29:09.979000 audit[1411]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.979000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff58e42f0 a2=0 a3=1 items=0 ppid=1361 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:29:09.980000 audit[1413]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.980000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffffad6fd60 a2=0 a3=1 items=0 ppid=1361 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:29:09.987000 audit[1417]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.987000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdef47600 a2=0 a3=1 items=0 ppid=1361 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:29:09.998000 audit[1418]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:09.998000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc3aa0c10 a2=0 a3=1 items=0 ppid=1361 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:09.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:29:10.008526 kernel: Initializing XFRM netlink socket May 13 00:29:10.033501 env[1361]: time="2025-05-13T00:29:10.033446149Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:29:10.047000 audit[1426]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.047000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffcce68fa0 a2=0 a3=1 items=0 ppid=1361 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:29:10.064000 audit[1429]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.064000 audit[1429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc99dde30 a2=0 a3=1 items=0 ppid=1361 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.064000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:29:10.067000 audit[1432]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.067000 audit[1432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd44c0bc0 a2=0 a3=1 items=0 ppid=1361 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:29:10.068000 audit[1434]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.068000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff24ba410 a2=0 a3=1 items=0 ppid=1361 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.068000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:29:10.071000 audit[1436]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.071000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe16a1d60 a2=0 a3=1 items=0 ppid=1361 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:29:10.073000 audit[1438]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.073000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffcfe9060 a2=0 a3=1 items=0 ppid=1361 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:29:10.075000 audit[1440]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.075000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdb28b7f0 a2=0 a3=1 items=0 ppid=1361 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:29:10.082000 audit[1443]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.082000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcc1dd0c0 a2=0 a3=1 items=0 ppid=1361 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:29:10.084000 audit[1445]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.084000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe0e58ac0 a2=0 a3=1 items=0 ppid=1361 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:29:10.086000 audit[1447]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.086000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc761d1f0 a2=0 a3=1 items=0 ppid=1361 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:29:10.088000 audit[1449]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.088000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc067e360 a2=0 a3=1 items=0 ppid=1361 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:29:10.090191 systemd-networkd[1036]: docker0: Link UP May 13 00:29:10.095000 audit[1453]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.095000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe4d2f40 a2=0 a3=1 items=0 ppid=1361 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:29:10.107000 audit[1454]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:10.107000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff8afaf80 a2=0 a3=1 items=0 ppid=1361 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:10.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:29:10.108965 env[1361]: time="2025-05-13T00:29:10.108916986Z" level=info msg="Loading containers: done." May 13 00:29:10.132150 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3610414975-merged.mount: Deactivated successfully. May 13 00:29:10.137556 env[1361]: time="2025-05-13T00:29:10.137300383Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:29:10.137556 env[1361]: time="2025-05-13T00:29:10.137496896Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:29:10.137715 env[1361]: time="2025-05-13T00:29:10.137615298Z" level=info msg="Daemon has completed initialization" May 13 00:29:10.157619 systemd[1]: Started docker.service. May 13 00:29:10.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:10.166760 env[1361]: time="2025-05-13T00:29:10.166589152Z" level=info msg="API listen on /run/docker.sock" May 13 00:29:10.906717 env[1213]: time="2025-05-13T00:29:10.906669484Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 13 00:29:11.455863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3918443926.mount: Deactivated successfully. May 13 00:29:12.798188 env[1213]: time="2025-05-13T00:29:12.798119509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:12.800961 env[1213]: time="2025-05-13T00:29:12.800909664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:12.803459 env[1213]: time="2025-05-13T00:29:12.803412441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:12.805532 env[1213]: time="2025-05-13T00:29:12.805488362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:12.806299 env[1213]: time="2025-05-13T00:29:12.806258954Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6\"" May 13 00:29:12.815876 env[1213]: time="2025-05-13T00:29:12.815842205Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 13 00:29:14.363780 env[1213]: time="2025-05-13T00:29:14.363728270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:14.365882 env[1213]: time="2025-05-13T00:29:14.365853336Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:14.367980 env[1213]: time="2025-05-13T00:29:14.367944806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:14.370021 env[1213]: time="2025-05-13T00:29:14.369988098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:14.370740 env[1213]: time="2025-05-13T00:29:14.370714363Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14\"" May 13 00:29:14.379854 env[1213]: time="2025-05-13T00:29:14.379827041Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 13 00:29:14.771720 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:29:14.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.772796 kernel: kauditd_printk_skb: 84 callbacks suppressed May 13 00:29:14.772829 kernel: audit: type=1130 audit(1747096154.770:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.771907 systemd[1]: Stopped kubelet.service. May 13 00:29:14.773349 systemd[1]: Starting kubelet.service... May 13 00:29:14.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.778295 kernel: audit: type=1131 audit(1747096154.770:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.859365 systemd[1]: Started kubelet.service. May 13 00:29:14.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.862541 kernel: audit: type=1130 audit(1747096154.858:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:14.897224 kubelet[1516]: E0513 00:29:14.897169 1516 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:29:14.903749 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:29:14.903892 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:29:14.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:29:14.907533 kernel: audit: type=1131 audit(1747096154.902:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:29:15.487713 env[1213]: time="2025-05-13T00:29:15.487665269Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:15.489166 env[1213]: time="2025-05-13T00:29:15.489051917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:15.494437 env[1213]: time="2025-05-13T00:29:15.494383528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:15.499044 env[1213]: time="2025-05-13T00:29:15.499008711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:15.499747 env[1213]: time="2025-05-13T00:29:15.499702994Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba\"" May 13 00:29:15.508823 env[1213]: time="2025-05-13T00:29:15.508791434Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 13 00:29:16.508826 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount297992510.mount: Deactivated successfully. May 13 00:29:16.932791 env[1213]: time="2025-05-13T00:29:16.932570031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:16.934335 env[1213]: time="2025-05-13T00:29:16.934298077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:16.935951 env[1213]: time="2025-05-13T00:29:16.935924559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:16.936912 env[1213]: time="2025-05-13T00:29:16.936884793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:16.937830 env[1213]: time="2025-05-13T00:29:16.937793686Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 13 00:29:16.946874 env[1213]: time="2025-05-13T00:29:16.946837742Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 00:29:17.454412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2070083555.mount: Deactivated successfully. May 13 00:29:18.470678 env[1213]: time="2025-05-13T00:29:18.470629025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.472164 env[1213]: time="2025-05-13T00:29:18.472132212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.473880 env[1213]: time="2025-05-13T00:29:18.473845350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.475567 env[1213]: time="2025-05-13T00:29:18.475541585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.477046 env[1213]: time="2025-05-13T00:29:18.476491442Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 13 00:29:18.486029 env[1213]: time="2025-05-13T00:29:18.485988447Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 13 00:29:18.918458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1406987492.mount: Deactivated successfully. May 13 00:29:18.923438 env[1213]: time="2025-05-13T00:29:18.923393657Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.925735 env[1213]: time="2025-05-13T00:29:18.925698088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.927561 env[1213]: time="2025-05-13T00:29:18.927537421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.928667 env[1213]: time="2025-05-13T00:29:18.928639366Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:18.929277 env[1213]: time="2025-05-13T00:29:18.929249360Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" May 13 00:29:18.939275 env[1213]: time="2025-05-13T00:29:18.939244751Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 13 00:29:19.410316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount701780615.mount: Deactivated successfully. May 13 00:29:21.357714 env[1213]: time="2025-05-13T00:29:21.357663133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:21.359405 env[1213]: time="2025-05-13T00:29:21.359372654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:21.361472 env[1213]: time="2025-05-13T00:29:21.361443519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:21.363437 env[1213]: time="2025-05-13T00:29:21.363403715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:21.364407 env[1213]: time="2025-05-13T00:29:21.364382554Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" May 13 00:29:25.061486 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:29:25.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.061675 systemd[1]: Stopped kubelet.service. May 13 00:29:25.063163 systemd[1]: Starting kubelet.service... May 13 00:29:25.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.066555 kernel: audit: type=1130 audit(1747096165.061:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.066618 kernel: audit: type=1131 audit(1747096165.061:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.159229 systemd[1]: Started kubelet.service. May 13 00:29:25.162592 kernel: audit: type=1130 audit(1747096165.158:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:25.195362 kubelet[1630]: E0513 00:29:25.195310 1630 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:29:25.197789 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:29:25.197925 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:29:25.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:29:25.201524 kernel: audit: type=1131 audit(1747096165.197:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:29:27.141314 systemd[1]: Stopped kubelet.service. May 13 00:29:27.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.144014 systemd[1]: Starting kubelet.service... May 13 00:29:27.146501 kernel: audit: type=1130 audit(1747096167.140:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.146573 kernel: audit: type=1131 audit(1747096167.140:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.164876 systemd[1]: Reloading. May 13 00:29:27.210805 /usr/lib/systemd/system-generators/torcx-generator[1666]: time="2025-05-13T00:29:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:29:27.210838 /usr/lib/systemd/system-generators/torcx-generator[1666]: time="2025-05-13T00:29:27Z" level=info msg="torcx already run" May 13 00:29:27.304141 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:29:27.304330 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:29:27.320172 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:29:27.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376214 kernel: audit: type=1400 audit(1747096167.369:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376288 kernel: audit: type=1400 audit(1747096167.370:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376310 kernel: audit: type=1400 audit(1747096167.370:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378533 kernel: audit: type=1400 audit(1747096167.370:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit: BPF prog-id=40 op=LOAD May 13 00:29:27.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.374000 audit: BPF prog-id=41 op=LOAD May 13 00:29:27.374000 audit: BPF prog-id=24 op=UNLOAD May 13 00:29:27.374000 audit: BPF prog-id=25 op=UNLOAD May 13 00:29:27.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.377000 audit: BPF prog-id=42 op=LOAD May 13 00:29:27.377000 audit: BPF prog-id=26 op=UNLOAD May 13 00:29:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit: BPF prog-id=43 op=LOAD May 13 00:29:27.380000 audit: BPF prog-id=38 op=UNLOAD May 13 00:29:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit: BPF prog-id=44 op=LOAD May 13 00:29:27.381000 audit: BPF prog-id=27 op=UNLOAD May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit: BPF prog-id=45 op=LOAD May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit: BPF prog-id=46 op=LOAD May 13 00:29:27.381000 audit: BPF prog-id=28 op=UNLOAD May 13 00:29:27.381000 audit: BPF prog-id=29 op=UNLOAD May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.381000 audit: BPF prog-id=47 op=LOAD May 13 00:29:27.381000 audit: BPF prog-id=33 op=UNLOAD May 13 00:29:27.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit: BPF prog-id=48 op=LOAD May 13 00:29:27.383000 audit: BPF prog-id=35 op=UNLOAD May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit: BPF prog-id=49 op=LOAD May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit: BPF prog-id=50 op=LOAD May 13 00:29:27.383000 audit: BPF prog-id=36 op=UNLOAD May 13 00:29:27.383000 audit: BPF prog-id=37 op=UNLOAD May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit: BPF prog-id=51 op=LOAD May 13 00:29:27.384000 audit: BPF prog-id=34 op=UNLOAD May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit: BPF prog-id=52 op=LOAD May 13 00:29:27.384000 audit: BPF prog-id=30 op=UNLOAD May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit: BPF prog-id=53 op=LOAD May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:27.384000 audit: BPF prog-id=54 op=LOAD May 13 00:29:27.384000 audit: BPF prog-id=31 op=UNLOAD May 13 00:29:27.384000 audit: BPF prog-id=32 op=UNLOAD May 13 00:29:27.400293 systemd[1]: Started kubelet.service. May 13 00:29:27.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.402074 systemd[1]: Stopping kubelet.service... May 13 00:29:27.402428 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:29:27.402628 systemd[1]: Stopped kubelet.service. May 13 00:29:27.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.404365 systemd[1]: Starting kubelet.service... May 13 00:29:27.495083 systemd[1]: Started kubelet.service. May 13 00:29:27.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:27.536217 kubelet[1710]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:29:27.536217 kubelet[1710]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:29:27.536217 kubelet[1710]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:29:27.537147 kubelet[1710]: I0513 00:29:27.537090 1710 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:29:28.368317 kubelet[1710]: I0513 00:29:28.368269 1710 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 00:29:28.368317 kubelet[1710]: I0513 00:29:28.368305 1710 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:29:28.368547 kubelet[1710]: I0513 00:29:28.368533 1710 server.go:927] "Client rotation is on, will bootstrap in background" May 13 00:29:28.394452 kubelet[1710]: I0513 00:29:28.394394 1710 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:29:28.394817 kubelet[1710]: E0513 00:29:28.394798 1710 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.75:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.405781 kubelet[1710]: I0513 00:29:28.405740 1710 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:29:28.406235 kubelet[1710]: I0513 00:29:28.406187 1710 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:29:28.406449 kubelet[1710]: I0513 00:29:28.406231 1710 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 00:29:28.406614 kubelet[1710]: I0513 00:29:28.406602 1710 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:29:28.406656 kubelet[1710]: I0513 00:29:28.406616 1710 container_manager_linux.go:301] "Creating device plugin manager" May 13 00:29:28.407002 kubelet[1710]: I0513 00:29:28.406980 1710 state_mem.go:36] "Initialized new in-memory state store" May 13 00:29:28.408421 kubelet[1710]: I0513 00:29:28.408399 1710 kubelet.go:400] "Attempting to sync node with API server" May 13 00:29:28.408456 kubelet[1710]: I0513 00:29:28.408423 1710 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:29:28.408952 kubelet[1710]: I0513 00:29:28.408942 1710 kubelet.go:312] "Adding apiserver pod source" May 13 00:29:28.409090 kubelet[1710]: I0513 00:29:28.409075 1710 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:29:28.409465 kubelet[1710]: W0513 00:29:28.409408 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.75:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.409537 kubelet[1710]: E0513 00:29:28.409478 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.75:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.409594 kubelet[1710]: W0513 00:29:28.409564 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.75:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.409624 kubelet[1710]: E0513 00:29:28.409598 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.75:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.410655 kubelet[1710]: I0513 00:29:28.410627 1710 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:29:28.411284 kubelet[1710]: I0513 00:29:28.411261 1710 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:29:28.411403 kubelet[1710]: W0513 00:29:28.411386 1710 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:29:28.414072 kubelet[1710]: I0513 00:29:28.414035 1710 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:29:28.414072 kubelet[1710]: I0513 00:29:28.414076 1710 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:29:28.414268 kubelet[1710]: I0513 00:29:28.414255 1710 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:29:28.414404 kubelet[1710]: I0513 00:29:28.414392 1710 server.go:1264] "Started kubelet" May 13 00:29:28.414548 kubelet[1710]: I0513 00:29:28.414471 1710 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:29:28.413000 audit[1710]: AVC avc: denied { mac_admin } for pid=1710 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:28.413000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:28.413000 audit[1710]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400099e7e0 a1=4000057f08 a2=400099e7b0 a3=25 items=0 ppid=1 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:28.413000 audit[1710]: AVC avc: denied { mac_admin } for pid=1710 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:28.413000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:28.413000 audit[1710]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400066ce20 a1=4000057f20 a2=400099e870 a3=25 items=0 ppid=1 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:28.416000 audit[1722]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.416000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3328060 a2=0 a3=1 items=0 ppid=1710 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:29:28.417000 audit[1723]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.417000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd674bee0 a2=0 a3=1 items=0 ppid=1710 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:29:28.421740 kubelet[1710]: I0513 00:29:28.420697 1710 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 00:29:28.421000 audit[1725]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.421000 audit[1725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff3f71580 a2=0 a3=1 items=0 ppid=1710 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:29:28.423367 kubelet[1710]: I0513 00:29:28.423317 1710 server.go:455] "Adding debug handlers to kubelet server" May 13 00:29:28.423566 kubelet[1710]: E0513 00:29:28.423244 1710 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.75:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.75:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eeeb56ab035dc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:29:28.41275542 +0000 UTC m=+0.913573769,LastTimestamp:2025-05-13 00:29:28.41275542 +0000 UTC m=+0.913573769,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:29:28.424239 kubelet[1710]: I0513 00:29:28.424179 1710 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:29:28.424439 kubelet[1710]: I0513 00:29:28.424412 1710 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:29:28.425617 kubelet[1710]: I0513 00:29:28.425593 1710 reconciler.go:26] "Reconciler: start to sync state" May 13 00:29:28.425684 kubelet[1710]: I0513 00:29:28.425654 1710 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:29:28.426052 kubelet[1710]: W0513 00:29:28.425997 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.75:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.426114 kubelet[1710]: E0513 00:29:28.426060 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.75:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.426225 kubelet[1710]: E0513 00:29:28.426014 1710 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.75:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.75:6443: connect: connection refused" interval="200ms" May 13 00:29:28.426392 kubelet[1710]: I0513 00:29:28.426236 1710 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:29:28.427855 kubelet[1710]: E0513 00:29:28.427821 1710 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:29:28.428482 kubelet[1710]: I0513 00:29:28.428454 1710 factory.go:221] Registration of the containerd container factory successfully May 13 00:29:28.428598 kubelet[1710]: I0513 00:29:28.428584 1710 factory.go:221] Registration of the systemd container factory successfully May 13 00:29:28.428000 audit[1727]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.428000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe8a4bc40 a2=0 a3=1 items=0 ppid=1710 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:29:28.436000 audit[1731]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.436000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc3963510 a2=0 a3=1 items=0 ppid=1710 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:29:28.437372 kubelet[1710]: I0513 00:29:28.437300 1710 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:29:28.437000 audit[1732]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:28.437000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc8410b0 a2=0 a3=1 items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:29:28.438219 kubelet[1710]: I0513 00:29:28.438206 1710 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:29:28.438369 kubelet[1710]: I0513 00:29:28.438351 1710 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:29:28.438411 kubelet[1710]: I0513 00:29:28.438374 1710 kubelet.go:2337] "Starting kubelet main sync loop" May 13 00:29:28.438452 kubelet[1710]: E0513 00:29:28.438427 1710 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:29:28.439000 audit[1734]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.439000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3fd7930 a2=0 a3=1 items=0 ppid=1710 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:29:28.440000 audit[1736]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.440000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6102240 a2=0 a3=1 items=0 ppid=1710 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:29:28.442944 kubelet[1710]: W0513 00:29:28.442885 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.75:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.442944 kubelet[1710]: E0513 00:29:28.442943 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.75:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:28.442000 audit[1737]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:28.442000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb7422b0 a2=0 a3=1 items=0 ppid=1710 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:29:28.442000 audit[1739]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:28.442000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbd402c0 a2=0 a3=1 items=0 ppid=1710 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:29:28.443875 kubelet[1710]: I0513 00:29:28.443856 1710 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:29:28.443875 kubelet[1710]: I0513 00:29:28.443872 1710 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:29:28.443961 kubelet[1710]: I0513 00:29:28.443891 1710 state_mem.go:36] "Initialized new in-memory state store" May 13 00:29:28.444000 audit[1742]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:28.444000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffce238080 a2=0 a3=1 items=0 ppid=1710 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:29:28.445000 audit[1743]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:28.445000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffee09ed50 a2=0 a3=1 items=0 ppid=1710 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:29:28.506300 kubelet[1710]: I0513 00:29:28.506265 1710 policy_none.go:49] "None policy: Start" May 13 00:29:28.507080 kubelet[1710]: I0513 00:29:28.507057 1710 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:29:28.507080 kubelet[1710]: I0513 00:29:28.507082 1710 state_mem.go:35] "Initializing new in-memory state store" May 13 00:29:28.514006 systemd[1]: Created slice kubepods.slice. May 13 00:29:28.518767 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:29:28.522156 kubelet[1710]: I0513 00:29:28.522129 1710 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:29:28.522669 kubelet[1710]: E0513 00:29:28.522639 1710 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.75:6443/api/v1/nodes\": dial tcp 10.0.0.75:6443: connect: connection refused" node="localhost" May 13 00:29:28.531028 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:29:28.532480 kubelet[1710]: I0513 00:29:28.532448 1710 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:29:28.531000 audit[1710]: AVC avc: denied { mac_admin } for pid=1710 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:28.531000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:28.531000 audit[1710]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f129f0 a1=40007a7980 a2=4000f129c0 a3=25 items=0 ppid=1 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:28.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:28.532730 kubelet[1710]: I0513 00:29:28.532554 1710 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:29:28.532730 kubelet[1710]: I0513 00:29:28.532675 1710 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:29:28.532811 kubelet[1710]: I0513 00:29:28.532790 1710 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:29:28.534737 kubelet[1710]: E0513 00:29:28.534710 1710 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:29:28.539588 kubelet[1710]: I0513 00:29:28.539535 1710 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 13 00:29:28.540782 kubelet[1710]: I0513 00:29:28.540745 1710 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 13 00:29:28.541679 kubelet[1710]: I0513 00:29:28.541648 1710 topology_manager.go:215] "Topology Admit Handler" podUID="2d18567f4681c1df39793f5fec7536bc" podNamespace="kube-system" podName="kube-apiserver-localhost" May 13 00:29:28.548969 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 13 00:29:28.562310 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 13 00:29:28.565894 systemd[1]: Created slice kubepods-burstable-pod2d18567f4681c1df39793f5fec7536bc.slice. May 13 00:29:28.628546 kubelet[1710]: E0513 00:29:28.626807 1710 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.75:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.75:6443: connect: connection refused" interval="400ms" May 13 00:29:28.723983 kubelet[1710]: I0513 00:29:28.723939 1710 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:29:28.724552 kubelet[1710]: E0513 00:29:28.724523 1710 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.75:6443/api/v1/nodes\": dial tcp 10.0.0.75:6443: connect: connection refused" node="localhost" May 13 00:29:28.726707 kubelet[1710]: I0513 00:29:28.726680 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:28.726854 kubelet[1710]: I0513 00:29:28.726833 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:28.726952 kubelet[1710]: I0513 00:29:28.726937 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:28.727032 kubelet[1710]: I0513 00:29:28.727016 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:28.727113 kubelet[1710]: I0513 00:29:28.727100 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 13 00:29:28.727179 kubelet[1710]: I0513 00:29:28.727167 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:28.727259 kubelet[1710]: I0513 00:29:28.727246 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:28.727364 kubelet[1710]: I0513 00:29:28.727350 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:28.727438 kubelet[1710]: I0513 00:29:28.727426 1710 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:28.860626 kubelet[1710]: E0513 00:29:28.860593 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:28.861375 env[1213]: time="2025-05-13T00:29:28.861335665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 13 00:29:28.864541 kubelet[1710]: E0513 00:29:28.864517 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:28.864982 env[1213]: time="2025-05-13T00:29:28.864947144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 13 00:29:28.870095 kubelet[1710]: E0513 00:29:28.870057 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:28.870636 env[1213]: time="2025-05-13T00:29:28.870600480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:2d18567f4681c1df39793f5fec7536bc,Namespace:kube-system,Attempt:0,}" May 13 00:29:29.028159 kubelet[1710]: E0513 00:29:29.028040 1710 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.75:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.75:6443: connect: connection refused" interval="800ms" May 13 00:29:29.126403 kubelet[1710]: I0513 00:29:29.126372 1710 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:29:29.126733 kubelet[1710]: E0513 00:29:29.126708 1710 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.75:6443/api/v1/nodes\": dial tcp 10.0.0.75:6443: connect: connection refused" node="localhost" May 13 00:29:29.224500 kubelet[1710]: W0513 00:29:29.224422 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.75:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.224500 kubelet[1710]: E0513 00:29:29.224496 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.75:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.341441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4078265176.mount: Deactivated successfully. May 13 00:29:29.345610 env[1213]: time="2025-05-13T00:29:29.345565908Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.348898 env[1213]: time="2025-05-13T00:29:29.348869016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.350253 env[1213]: time="2025-05-13T00:29:29.350225474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.350989 env[1213]: time="2025-05-13T00:29:29.350935887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.351895 env[1213]: time="2025-05-13T00:29:29.351863754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.353217 env[1213]: time="2025-05-13T00:29:29.353186148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.355817 env[1213]: time="2025-05-13T00:29:29.355788198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.358080 env[1213]: time="2025-05-13T00:29:29.358050973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.361772 env[1213]: time="2025-05-13T00:29:29.361740932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.362910 env[1213]: time="2025-05-13T00:29:29.362882935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.363927 env[1213]: time="2025-05-13T00:29:29.363894401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.365071 env[1213]: time="2025-05-13T00:29:29.365045039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:29.386536 env[1213]: time="2025-05-13T00:29:29.386462184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:29.386536 env[1213]: time="2025-05-13T00:29:29.386499965Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:29.386536 env[1213]: time="2025-05-13T00:29:29.386521435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:29.386746 env[1213]: time="2025-05-13T00:29:29.386707184Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/293ee33b3d52fd71d65841bbdd87ae77e3eb1d267bc8138bd2c08ec4a44d2ddc pid=1761 runtime=io.containerd.runc.v2 May 13 00:29:29.386970 env[1213]: time="2025-05-13T00:29:29.386908966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:29.386970 env[1213]: time="2025-05-13T00:29:29.386952584Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:29.388155 env[1213]: time="2025-05-13T00:29:29.388099105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:29.388412 env[1213]: time="2025-05-13T00:29:29.388367893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a88e7ed97ad736978e56e761b80f84c5c64fc0ef9c7100615a3ea162162ed297 pid=1764 runtime=io.containerd.runc.v2 May 13 00:29:29.389103 env[1213]: time="2025-05-13T00:29:29.388964082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:29.389162 env[1213]: time="2025-05-13T00:29:29.389115528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:29.389162 env[1213]: time="2025-05-13T00:29:29.389142755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:29.389370 env[1213]: time="2025-05-13T00:29:29.389317150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab2f3ed6e4bed218f4f6602de18f498b1e90612d99414b21656cf1527d9a9786 pid=1771 runtime=io.containerd.runc.v2 May 13 00:29:29.399858 systemd[1]: Started cri-containerd-a88e7ed97ad736978e56e761b80f84c5c64fc0ef9c7100615a3ea162162ed297.scope. May 13 00:29:29.405697 systemd[1]: Started cri-containerd-293ee33b3d52fd71d65841bbdd87ae77e3eb1d267bc8138bd2c08ec4a44d2ddc.scope. May 13 00:29:29.420763 systemd[1]: Started cri-containerd-ab2f3ed6e4bed218f4f6602de18f498b1e90612d99414b21656cf1527d9a9786.scope. May 13 00:29:29.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.434000 audit: BPF prog-id=55 op=LOAD May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1764 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386537656439376164373336393738653536653736316238306638 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1764 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386537656439376164373336393738653536653736316238306638 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.436000 audit: BPF prog-id=56 op=LOAD May 13 00:29:29.436000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1764 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386537656439376164373336393738653536653736316238306638 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit: BPF prog-id=57 op=LOAD May 13 00:29:29.438000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1764 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386537656439376164373336393738653536653736316238306638 May 13 00:29:29.438000 audit: BPF prog-id=57 op=UNLOAD May 13 00:29:29.438000 audit: BPF prog-id=56 op=UNLOAD May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.438000 audit: BPF prog-id=58 op=LOAD May 13 00:29:29.438000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1764 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386537656439376164373336393738653536653736316238306638 May 13 00:29:29.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.444000 audit: BPF prog-id=59 op=LOAD May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1761 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336565333362336435326664373164363538343162626464383761 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1761 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336565333362336435326664373164363538343162626464383761 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit: BPF prog-id=60 op=LOAD May 13 00:29:29.445000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1761 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336565333362336435326664373164363538343162626464383761 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit: BPF prog-id=61 op=LOAD May 13 00:29:29.445000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1761 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336565333362336435326664373164363538343162626464383761 May 13 00:29:29.445000 audit: BPF prog-id=61 op=UNLOAD May 13 00:29:29.445000 audit: BPF prog-id=60 op=UNLOAD May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.445000 audit: BPF prog-id=62 op=LOAD May 13 00:29:29.445000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1761 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336565333362336435326664373164363538343162626464383761 May 13 00:29:29.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.448000 audit: BPF prog-id=63 op=LOAD May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1771 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326633656436653462656432313866346636363032646531386634 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1771 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326633656436653462656432313866346636363032646531386634 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit: BPF prog-id=64 op=LOAD May 13 00:29:29.449000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1771 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326633656436653462656432313866346636363032646531386634 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.449000 audit: BPF prog-id=65 op=LOAD May 13 00:29:29.449000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1771 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326633656436653462656432313866346636363032646531386634 May 13 00:29:29.450000 audit: BPF prog-id=65 op=UNLOAD May 13 00:29:29.450000 audit: BPF prog-id=64 op=UNLOAD May 13 00:29:29.450000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.450000 audit: BPF prog-id=66 op=LOAD May 13 00:29:29.450000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1771 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326633656436653462656432313866346636363032646531386634 May 13 00:29:29.463792 env[1213]: time="2025-05-13T00:29:29.461733558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:2d18567f4681c1df39793f5fec7536bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"a88e7ed97ad736978e56e761b80f84c5c64fc0ef9c7100615a3ea162162ed297\"" May 13 00:29:29.463925 kubelet[1710]: E0513 00:29:29.462723 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:29.465389 env[1213]: time="2025-05-13T00:29:29.465264674Z" level=info msg="CreateContainer within sandbox \"a88e7ed97ad736978e56e761b80f84c5c64fc0ef9c7100615a3ea162162ed297\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:29:29.471819 env[1213]: time="2025-05-13T00:29:29.471776535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"293ee33b3d52fd71d65841bbdd87ae77e3eb1d267bc8138bd2c08ec4a44d2ddc\"" May 13 00:29:29.472803 kubelet[1710]: E0513 00:29:29.472550 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:29.474660 env[1213]: time="2025-05-13T00:29:29.474620746Z" level=info msg="CreateContainer within sandbox \"293ee33b3d52fd71d65841bbdd87ae77e3eb1d267bc8138bd2c08ec4a44d2ddc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:29:29.481424 env[1213]: time="2025-05-13T00:29:29.481375449Z" level=info msg="CreateContainer within sandbox \"a88e7ed97ad736978e56e761b80f84c5c64fc0ef9c7100615a3ea162162ed297\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"88b08b4796924c2e18200acc4805430a89c04dbfd2644190568876425c72af34\"" May 13 00:29:29.482441 env[1213]: time="2025-05-13T00:29:29.482398389Z" level=info msg="StartContainer for \"88b08b4796924c2e18200acc4805430a89c04dbfd2644190568876425c72af34\"" May 13 00:29:29.483782 env[1213]: time="2025-05-13T00:29:29.483742813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"ab2f3ed6e4bed218f4f6602de18f498b1e90612d99414b21656cf1527d9a9786\"" May 13 00:29:29.484536 kubelet[1710]: E0513 00:29:29.484420 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:29.487130 env[1213]: time="2025-05-13T00:29:29.487092898Z" level=info msg="CreateContainer within sandbox \"ab2f3ed6e4bed218f4f6602de18f498b1e90612d99414b21656cf1527d9a9786\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:29:29.487515 env[1213]: time="2025-05-13T00:29:29.487473632Z" level=info msg="CreateContainer within sandbox \"293ee33b3d52fd71d65841bbdd87ae77e3eb1d267bc8138bd2c08ec4a44d2ddc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"39759893721261e43b1ed4c84bc88bcb581a6f752a9f1e626840a8196abf5736\"" May 13 00:29:29.487904 env[1213]: time="2025-05-13T00:29:29.487870118Z" level=info msg="StartContainer for \"39759893721261e43b1ed4c84bc88bcb581a6f752a9f1e626840a8196abf5736\"" May 13 00:29:29.499741 systemd[1]: Started cri-containerd-88b08b4796924c2e18200acc4805430a89c04dbfd2644190568876425c72af34.scope. May 13 00:29:29.503706 env[1213]: time="2025-05-13T00:29:29.503646576Z" level=info msg="CreateContainer within sandbox \"ab2f3ed6e4bed218f4f6602de18f498b1e90612d99414b21656cf1527d9a9786\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"05e6f3c766689e20f1811c79689d36c62d14ec3028f1448beb676e1007b779f1\"" May 13 00:29:29.505539 env[1213]: time="2025-05-13T00:29:29.504121385Z" level=info msg="StartContainer for \"05e6f3c766689e20f1811c79689d36c62d14ec3028f1448beb676e1007b779f1\"" May 13 00:29:29.517348 systemd[1]: Started cri-containerd-39759893721261e43b1ed4c84bc88bcb581a6f752a9f1e626840a8196abf5736.scope. May 13 00:29:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.541000 audit: BPF prog-id=67 op=LOAD May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1761 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339373539383933373231323631653433623165643463383462633838 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1761 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339373539383933373231323631653433623165643463383462633838 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit: BPF prog-id=68 op=LOAD May 13 00:29:29.542000 audit[1893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1761 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339373539383933373231323631653433623165643463383462633838 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit: BPF prog-id=69 op=LOAD May 13 00:29:29.542000 audit[1893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1761 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339373539383933373231323631653433623165643463383462633838 May 13 00:29:29.542000 audit: BPF prog-id=69 op=UNLOAD May 13 00:29:29.542000 audit: BPF prog-id=68 op=UNLOAD May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.542000 audit: BPF prog-id=70 op=LOAD May 13 00:29:29.542000 audit[1893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1761 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339373539383933373231323631653433623165643463383462633838 May 13 00:29:29.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.543000 audit: BPF prog-id=71 op=LOAD May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623038623437393639323463326531383230306163633438303534 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623038623437393639323463326531383230306163633438303534 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit: BPF prog-id=72 op=LOAD May 13 00:29:29.544000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623038623437393639323463326531383230306163633438303534 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit: BPF prog-id=73 op=LOAD May 13 00:29:29.544000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623038623437393639323463326531383230306163633438303534 May 13 00:29:29.544000 audit: BPF prog-id=73 op=UNLOAD May 13 00:29:29.544000 audit: BPF prog-id=72 op=UNLOAD May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.544000 audit: BPF prog-id=74 op=LOAD May 13 00:29:29.544000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623038623437393639323463326531383230306163633438303534 May 13 00:29:29.546601 systemd[1]: Started cri-containerd-05e6f3c766689e20f1811c79689d36c62d14ec3028f1448beb676e1007b779f1.scope. May 13 00:29:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.567000 audit: BPF prog-id=75 op=LOAD May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1771 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653666336337363636383965323066313831316337393638396433 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1771 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653666336337363636383965323066313831316337393638396433 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.568000 audit: BPF prog-id=76 op=LOAD May 13 00:29:29.568000 audit[1915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1771 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653666336337363636383965323066313831316337393638396433 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit: BPF prog-id=77 op=LOAD May 13 00:29:29.570000 audit[1915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1771 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653666336337363636383965323066313831316337393638396433 May 13 00:29:29.570000 audit: BPF prog-id=77 op=UNLOAD May 13 00:29:29.570000 audit: BPF prog-id=76 op=UNLOAD May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:29.570000 audit: BPF prog-id=78 op=LOAD May 13 00:29:29.570000 audit[1915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1771 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:29.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653666336337363636383965323066313831316337393638396433 May 13 00:29:29.574754 env[1213]: time="2025-05-13T00:29:29.574709205Z" level=info msg="StartContainer for \"88b08b4796924c2e18200acc4805430a89c04dbfd2644190568876425c72af34\" returns successfully" May 13 00:29:29.586767 env[1213]: time="2025-05-13T00:29:29.585727106Z" level=info msg="StartContainer for \"39759893721261e43b1ed4c84bc88bcb581a6f752a9f1e626840a8196abf5736\" returns successfully" May 13 00:29:29.598017 kubelet[1710]: W0513 00:29:29.597815 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.75:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.598017 kubelet[1710]: E0513 00:29:29.597898 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.75:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.616636 kubelet[1710]: W0513 00:29:29.616525 1710 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.75:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.616636 kubelet[1710]: E0513 00:29:29.616597 1710 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.75:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.75:6443: connect: connection refused May 13 00:29:29.624456 env[1213]: time="2025-05-13T00:29:29.621721694Z" level=info msg="StartContainer for \"05e6f3c766689e20f1811c79689d36c62d14ec3028f1448beb676e1007b779f1\" returns successfully" May 13 00:29:29.927870 kubelet[1710]: I0513 00:29:29.927773 1710 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:29:30.451463 kubelet[1710]: E0513 00:29:30.451432 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:30.453915 kubelet[1710]: E0513 00:29:30.453891 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:30.454935 kubelet[1710]: E0513 00:29:30.454909 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:31.392000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.395020 kernel: kauditd_printk_skb: 561 callbacks suppressed May 13 00:29:31.395061 kernel: audit: type=1400 audit(1747096171.392:546): avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.392000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004df0090 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.401898 kernel: audit: type=1300 audit(1747096171.392:546): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004df0090 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.392000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.405310 kernel: audit: type=1327 audit(1747096171.392:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.392000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.408283 kernel: audit: type=1400 audit(1747096171.392:547): avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.408331 kernel: audit: type=1300 audit(1747096171.392:547): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003ae4820 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.392000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003ae4820 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.392000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.415124 kernel: audit: type=1327 audit(1747096171.392:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.415168 kernel: audit: type=1400 audit(1747096171.393:548): avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.393000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.393000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004df0990 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.422198 kernel: audit: type=1300 audit(1747096171.393:548): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004df0990 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.425695 kernel: audit: type=1327 audit(1747096171.393:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.425769 kernel: audit: type=1400 audit(1747096171.394:549): avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.394000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.394000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40078ff230 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.398000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.398000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400556cf60 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.398000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.398000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=40065a7f80 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:29:31.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:29:31.461136 kubelet[1710]: E0513 00:29:31.456837 1710 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:31.466602 kubelet[1710]: E0513 00:29:31.466564 1710 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:29:31.578000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.578000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:31.578000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000d67e0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:31.578000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40003c8000 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:31.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:31.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:31.622845 kubelet[1710]: I0513 00:29:31.622798 1710 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 13 00:29:32.413957 kubelet[1710]: I0513 00:29:32.413920 1710 apiserver.go:52] "Watching apiserver" May 13 00:29:32.426727 kubelet[1710]: I0513 00:29:32.426663 1710 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:29:33.460846 systemd[1]: Reloading. May 13 00:29:33.519597 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2025-05-13T00:29:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:29:33.519633 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2025-05-13T00:29:33Z" level=info msg="torcx already run" May 13 00:29:33.576384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:29:33.576603 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:29:33.591930 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:29:33.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.653000 audit: BPF prog-id=79 op=LOAD May 13 00:29:33.653000 audit: BPF prog-id=59 op=UNLOAD May 13 00:29:33.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.654000 audit: BPF prog-id=80 op=LOAD May 13 00:29:33.654000 audit: BPF prog-id=71 op=UNLOAD May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit: BPF prog-id=81 op=LOAD May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.656000 audit: BPF prog-id=82 op=LOAD May 13 00:29:33.656000 audit: BPF prog-id=40 op=UNLOAD May 13 00:29:33.656000 audit: BPF prog-id=41 op=UNLOAD May 13 00:29:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.657000 audit: BPF prog-id=83 op=LOAD May 13 00:29:33.657000 audit: BPF prog-id=67 op=UNLOAD May 13 00:29:33.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.659000 audit: BPF prog-id=84 op=LOAD May 13 00:29:33.659000 audit: BPF prog-id=42 op=UNLOAD May 13 00:29:33.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.661000 audit: BPF prog-id=85 op=LOAD May 13 00:29:33.661000 audit: BPF prog-id=43 op=UNLOAD May 13 00:29:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit: BPF prog-id=86 op=LOAD May 13 00:29:33.662000 audit: BPF prog-id=44 op=UNLOAD May 13 00:29:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit: BPF prog-id=87 op=LOAD May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.663000 audit: BPF prog-id=88 op=LOAD May 13 00:29:33.663000 audit: BPF prog-id=45 op=UNLOAD May 13 00:29:33.663000 audit: BPF prog-id=46 op=UNLOAD May 13 00:29:33.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.664000 audit: BPF prog-id=89 op=LOAD May 13 00:29:33.664000 audit: BPF prog-id=47 op=UNLOAD May 13 00:29:33.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.666000 audit: BPF prog-id=90 op=LOAD May 13 00:29:33.666000 audit: BPF prog-id=48 op=UNLOAD May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit: BPF prog-id=91 op=LOAD May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.667000 audit: BPF prog-id=92 op=LOAD May 13 00:29:33.667000 audit: BPF prog-id=49 op=UNLOAD May 13 00:29:33.668000 audit: BPF prog-id=50 op=UNLOAD May 13 00:29:33.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.668000 audit: BPF prog-id=93 op=LOAD May 13 00:29:33.668000 audit: BPF prog-id=75 op=UNLOAD May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit: BPF prog-id=94 op=LOAD May 13 00:29:33.669000 audit: BPF prog-id=51 op=UNLOAD May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.669000 audit: BPF prog-id=95 op=LOAD May 13 00:29:33.669000 audit: BPF prog-id=55 op=UNLOAD May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit: BPF prog-id=96 op=LOAD May 13 00:29:33.670000 audit: BPF prog-id=52 op=UNLOAD May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit: BPF prog-id=97 op=LOAD May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.670000 audit: BPF prog-id=98 op=LOAD May 13 00:29:33.670000 audit: BPF prog-id=53 op=UNLOAD May 13 00:29:33.670000 audit: BPF prog-id=54 op=UNLOAD May 13 00:29:33.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.671000 audit: BPF prog-id=99 op=LOAD May 13 00:29:33.671000 audit: BPF prog-id=63 op=UNLOAD May 13 00:29:33.682544 kubelet[1710]: E0513 00:29:33.682357 1710 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{localhost.183eeeb56ab035dc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:29:28.41275542 +0000 UTC m=+0.913573769,LastTimestamp:2025-05-13 00:29:28.41275542 +0000 UTC m=+0.913573769,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:29:33.683044 systemd[1]: Stopping kubelet.service... May 13 00:29:33.707827 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:29:33.708025 systemd[1]: Stopped kubelet.service. May 13 00:29:33.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:33.708092 systemd[1]: kubelet.service: Consumed 1.269s CPU time. May 13 00:29:33.709883 systemd[1]: Starting kubelet.service... May 13 00:29:33.791606 systemd[1]: Started kubelet.service. May 13 00:29:33.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:33.826566 kubelet[2050]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:29:33.826566 kubelet[2050]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:29:33.826566 kubelet[2050]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:29:33.826902 kubelet[2050]: I0513 00:29:33.826603 2050 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:29:33.831106 kubelet[2050]: I0513 00:29:33.831076 2050 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 00:29:33.831207 kubelet[2050]: I0513 00:29:33.831196 2050 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:29:33.831415 kubelet[2050]: I0513 00:29:33.831399 2050 server.go:927] "Client rotation is on, will bootstrap in background" May 13 00:29:33.833476 kubelet[2050]: I0513 00:29:33.833451 2050 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:29:33.835450 kubelet[2050]: I0513 00:29:33.835424 2050 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:29:33.842492 kubelet[2050]: I0513 00:29:33.842470 2050 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:29:33.842709 kubelet[2050]: I0513 00:29:33.842679 2050 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:29:33.845658 kubelet[2050]: I0513 00:29:33.842711 2050 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 00:29:33.845658 kubelet[2050]: I0513 00:29:33.843716 2050 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:29:33.845658 kubelet[2050]: I0513 00:29:33.843729 2050 container_manager_linux.go:301] "Creating device plugin manager" May 13 00:29:33.845658 kubelet[2050]: I0513 00:29:33.843765 2050 state_mem.go:36] "Initialized new in-memory state store" May 13 00:29:33.845658 kubelet[2050]: I0513 00:29:33.843870 2050 kubelet.go:400] "Attempting to sync node with API server" May 13 00:29:33.846289 kubelet[2050]: I0513 00:29:33.843882 2050 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:29:33.846289 kubelet[2050]: I0513 00:29:33.843908 2050 kubelet.go:312] "Adding apiserver pod source" May 13 00:29:33.846289 kubelet[2050]: I0513 00:29:33.843920 2050 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:29:33.846557 kubelet[2050]: I0513 00:29:33.846538 2050 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:29:33.846748 kubelet[2050]: I0513 00:29:33.846735 2050 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:29:33.847242 kubelet[2050]: I0513 00:29:33.847187 2050 server.go:1264] "Started kubelet" May 13 00:29:33.849341 kubelet[2050]: I0513 00:29:33.849305 2050 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:29:33.849341 kubelet[2050]: I0513 00:29:33.849341 2050 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:29:33.849441 kubelet[2050]: I0513 00:29:33.849366 2050 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:29:33.847000 audit[2050]: AVC avc: denied { mac_admin } for pid=2050 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:33.847000 audit[2050]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b43800 a1=4000cb6180 a2=4000b437d0 a3=25 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:33.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:33.847000 audit[2050]: AVC avc: denied { mac_admin } for pid=2050 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:33.847000 audit[2050]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000eac00 a1=4000cb6198 a2=4000b43890 a3=25 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:33.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:33.859854 kubelet[2050]: E0513 00:29:33.852848 2050 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:29:33.859854 kubelet[2050]: I0513 00:29:33.853877 2050 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:29:33.859854 kubelet[2050]: I0513 00:29:33.854853 2050 server.go:455] "Adding debug handlers to kubelet server" May 13 00:29:33.859854 kubelet[2050]: I0513 00:29:33.855633 2050 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:29:33.859854 kubelet[2050]: I0513 00:29:33.855800 2050 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:29:33.859854 kubelet[2050]: I0513 00:29:33.856895 2050 factory.go:221] Registration of the systemd container factory successfully May 13 00:29:33.860067 kubelet[2050]: I0513 00:29:33.859908 2050 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 00:29:33.860473 kubelet[2050]: I0513 00:29:33.860183 2050 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:29:33.861915 kubelet[2050]: I0513 00:29:33.861893 2050 reconciler.go:26] "Reconciler: start to sync state" May 13 00:29:33.867581 kubelet[2050]: I0513 00:29:33.866195 2050 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:29:33.867948 kubelet[2050]: I0513 00:29:33.867911 2050 factory.go:221] Registration of the containerd container factory successfully May 13 00:29:33.878700 kubelet[2050]: I0513 00:29:33.878668 2050 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:29:33.879905 kubelet[2050]: I0513 00:29:33.879882 2050 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:29:33.879964 kubelet[2050]: I0513 00:29:33.879910 2050 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:29:33.879964 kubelet[2050]: I0513 00:29:33.879930 2050 kubelet.go:2337] "Starting kubelet main sync loop" May 13 00:29:33.880028 kubelet[2050]: E0513 00:29:33.879973 2050 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:29:33.902200 kubelet[2050]: I0513 00:29:33.902175 2050 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:29:33.902200 kubelet[2050]: I0513 00:29:33.902191 2050 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:29:33.902346 kubelet[2050]: I0513 00:29:33.902211 2050 state_mem.go:36] "Initialized new in-memory state store" May 13 00:29:33.902374 kubelet[2050]: I0513 00:29:33.902357 2050 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:29:33.902403 kubelet[2050]: I0513 00:29:33.902369 2050 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:29:33.902403 kubelet[2050]: I0513 00:29:33.902386 2050 policy_none.go:49] "None policy: Start" May 13 00:29:33.902967 kubelet[2050]: I0513 00:29:33.902951 2050 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:29:33.903077 kubelet[2050]: I0513 00:29:33.903064 2050 state_mem.go:35] "Initializing new in-memory state store" May 13 00:29:33.903277 kubelet[2050]: I0513 00:29:33.903259 2050 state_mem.go:75] "Updated machine memory state" May 13 00:29:33.907064 kubelet[2050]: I0513 00:29:33.907040 2050 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:29:33.905000 audit[2050]: AVC avc: denied { mac_admin } for pid=2050 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:33.905000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:29:33.905000 audit[2050]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001158bd0 a1=400117de00 a2=4001158ba0 a3=25 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:33.905000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:29:33.907291 kubelet[2050]: I0513 00:29:33.907098 2050 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:29:33.907291 kubelet[2050]: I0513 00:29:33.907240 2050 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:29:33.907369 kubelet[2050]: I0513 00:29:33.907345 2050 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:29:33.960905 kubelet[2050]: I0513 00:29:33.960872 2050 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:29:33.966998 kubelet[2050]: I0513 00:29:33.966973 2050 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 13 00:29:33.967095 kubelet[2050]: I0513 00:29:33.967048 2050 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 13 00:29:33.980893 kubelet[2050]: I0513 00:29:33.980853 2050 topology_manager.go:215] "Topology Admit Handler" podUID="2d18567f4681c1df39793f5fec7536bc" podNamespace="kube-system" podName="kube-apiserver-localhost" May 13 00:29:33.981171 kubelet[2050]: I0513 00:29:33.981144 2050 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 13 00:29:33.981315 kubelet[2050]: I0513 00:29:33.981295 2050 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 13 00:29:34.063763 kubelet[2050]: I0513 00:29:34.063703 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:34.063763 kubelet[2050]: I0513 00:29:34.063749 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 13 00:29:34.063763 kubelet[2050]: I0513 00:29:34.063774 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:34.063945 kubelet[2050]: I0513 00:29:34.063792 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:34.063945 kubelet[2050]: I0513 00:29:34.063810 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:34.063945 kubelet[2050]: I0513 00:29:34.063827 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:34.063945 kubelet[2050]: I0513 00:29:34.063841 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2d18567f4681c1df39793f5fec7536bc-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"2d18567f4681c1df39793f5fec7536bc\") " pod="kube-system/kube-apiserver-localhost" May 13 00:29:34.063945 kubelet[2050]: I0513 00:29:34.063854 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:34.064087 kubelet[2050]: I0513 00:29:34.063869 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:29:34.291219 kubelet[2050]: E0513 00:29:34.291181 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.291387 kubelet[2050]: E0513 00:29:34.291360 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.291625 kubelet[2050]: E0513 00:29:34.291605 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.844883 kubelet[2050]: I0513 00:29:34.844844 2050 apiserver.go:52] "Watching apiserver" May 13 00:29:34.861115 kubelet[2050]: I0513 00:29:34.861075 2050 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:29:34.892712 kubelet[2050]: E0513 00:29:34.892672 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.903035 kubelet[2050]: E0513 00:29:34.901103 2050 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:29:34.903035 kubelet[2050]: E0513 00:29:34.901554 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.903035 kubelet[2050]: E0513 00:29:34.902129 2050 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 13 00:29:34.903035 kubelet[2050]: E0513 00:29:34.902351 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:34.935491 kubelet[2050]: I0513 00:29:34.935432 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.935411836 podStartE2EDuration="1.935411836s" podCreationTimestamp="2025-05-13 00:29:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:29:34.927834995 +0000 UTC m=+1.132945967" watchObservedRunningTime="2025-05-13 00:29:34.935411836 +0000 UTC m=+1.140522808" May 13 00:29:34.935834 kubelet[2050]: I0513 00:29:34.935799 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.9357905020000001 podStartE2EDuration="1.935790502s" podCreationTimestamp="2025-05-13 00:29:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:29:34.935386605 +0000 UTC m=+1.140497577" watchObservedRunningTime="2025-05-13 00:29:34.935790502 +0000 UTC m=+1.140901434" May 13 00:29:34.956244 kubelet[2050]: I0513 00:29:34.956186 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.9561699780000001 podStartE2EDuration="1.956169978s" podCreationTimestamp="2025-05-13 00:29:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:29:34.947462296 +0000 UTC m=+1.152573268" watchObservedRunningTime="2025-05-13 00:29:34.956169978 +0000 UTC m=+1.161280950" May 13 00:29:34.962000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:34.962000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006280a0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:34.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:34.962000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:34.962000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001060800 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:34.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:34.962000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:34.962000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006280c0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:34.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:34.963000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:29:34.963000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d42120 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:34.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:35.459000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:29:35.459000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a80580 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:29:35.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:29:35.893966 kubelet[2050]: E0513 00:29:35.893922 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:35.894611 kubelet[2050]: E0513 00:29:35.894588 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:36.894936 kubelet[2050]: E0513 00:29:36.894905 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:38.763891 sudo[1349]: pam_unix(sudo:session): session closed for user root May 13 00:29:38.763000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:38.764627 kernel: kauditd_printk_skb: 287 callbacks suppressed May 13 00:29:38.764680 kernel: audit: type=1106 audit(1747096178.763:808): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:38.766000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:38.768718 sshd[1346]: pam_unix(sshd:session): session closed for user core May 13 00:29:38.770155 kernel: audit: type=1104 audit(1747096178.766:809): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:29:38.770000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:38.772369 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:29:38.772583 systemd[1]: session-7.scope: Consumed 7.732s CPU time. May 13 00:29:38.772959 systemd[1]: sshd@6-10.0.0.75:22-10.0.0.1:57896.service: Deactivated successfully. May 13 00:29:38.770000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:38.777980 kernel: audit: type=1106 audit(1747096178.770:810): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:38.778040 kernel: audit: type=1104 audit(1747096178.770:811): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:29:38.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.75:22-10.0.0.1:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:38.778117 systemd-logind[1200]: Session 7 logged out. Waiting for processes to exit. May 13 00:29:38.780811 kernel: audit: type=1131 audit(1747096178.772:812): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.75:22-10.0.0.1:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:29:38.781236 systemd-logind[1200]: Removed session 7. May 13 00:29:41.729426 kubelet[2050]: E0513 00:29:41.729393 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:41.901905 kubelet[2050]: E0513 00:29:41.901872 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:44.187516 kubelet[2050]: E0513 00:29:44.187479 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:44.726450 kubelet[2050]: E0513 00:29:44.726412 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:44.905781 kubelet[2050]: E0513 00:29:44.905751 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:45.907075 kubelet[2050]: E0513 00:29:45.907043 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:47.964045 update_engine[1203]: I0513 00:29:47.963992 1203 update_attempter.cc:509] Updating boot flags... May 13 00:29:49.272641 kubelet[2050]: I0513 00:29:49.272591 2050 topology_manager.go:215] "Topology Admit Handler" podUID="41ec3a81-9593-4478-8313-a684b8b44f34" podNamespace="kube-system" podName="kube-proxy-ngjzh" May 13 00:29:49.277459 kubelet[2050]: W0513 00:29:49.277419 2050 reflector.go:547] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 13 00:29:49.277459 kubelet[2050]: E0513 00:29:49.277459 2050 reflector.go:150] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 13 00:29:49.277622 kubelet[2050]: W0513 00:29:49.277419 2050 reflector.go:547] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 13 00:29:49.277622 kubelet[2050]: E0513 00:29:49.277477 2050 reflector.go:150] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 13 00:29:49.278028 systemd[1]: Created slice kubepods-besteffort-pod41ec3a81_9593_4478_8313_a684b8b44f34.slice. May 13 00:29:49.279855 kubelet[2050]: I0513 00:29:49.278734 2050 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:29:49.279855 kubelet[2050]: I0513 00:29:49.279312 2050 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:29:49.279952 env[1213]: time="2025-05-13T00:29:49.279090624Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:29:49.414083 kubelet[2050]: I0513 00:29:49.414037 2050 topology_manager.go:215] "Topology Admit Handler" podUID="4b2af6b9-3a8c-41d6-8338-9994f5172dd7" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-n2n2h" May 13 00:29:49.419618 systemd[1]: Created slice kubepods-besteffort-pod4b2af6b9_3a8c_41d6_8338_9994f5172dd7.slice. May 13 00:29:49.465396 kubelet[2050]: I0513 00:29:49.465341 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41ec3a81-9593-4478-8313-a684b8b44f34-xtables-lock\") pod \"kube-proxy-ngjzh\" (UID: \"41ec3a81-9593-4478-8313-a684b8b44f34\") " pod="kube-system/kube-proxy-ngjzh" May 13 00:29:49.465396 kubelet[2050]: I0513 00:29:49.465385 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41ec3a81-9593-4478-8313-a684b8b44f34-lib-modules\") pod \"kube-proxy-ngjzh\" (UID: \"41ec3a81-9593-4478-8313-a684b8b44f34\") " pod="kube-system/kube-proxy-ngjzh" May 13 00:29:49.465396 kubelet[2050]: I0513 00:29:49.465405 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vpwbc\" (UniqueName: \"kubernetes.io/projected/41ec3a81-9593-4478-8313-a684b8b44f34-kube-api-access-vpwbc\") pod \"kube-proxy-ngjzh\" (UID: \"41ec3a81-9593-4478-8313-a684b8b44f34\") " pod="kube-system/kube-proxy-ngjzh" May 13 00:29:49.465627 kubelet[2050]: I0513 00:29:49.465422 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4b2af6b9-3a8c-41d6-8338-9994f5172dd7-var-lib-calico\") pod \"tigera-operator-797db67f8-n2n2h\" (UID: \"4b2af6b9-3a8c-41d6-8338-9994f5172dd7\") " pod="tigera-operator/tigera-operator-797db67f8-n2n2h" May 13 00:29:49.465627 kubelet[2050]: I0513 00:29:49.465440 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwvbb\" (UniqueName: \"kubernetes.io/projected/4b2af6b9-3a8c-41d6-8338-9994f5172dd7-kube-api-access-fwvbb\") pod \"tigera-operator-797db67f8-n2n2h\" (UID: \"4b2af6b9-3a8c-41d6-8338-9994f5172dd7\") " pod="tigera-operator/tigera-operator-797db67f8-n2n2h" May 13 00:29:49.465627 kubelet[2050]: I0513 00:29:49.465469 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/41ec3a81-9593-4478-8313-a684b8b44f34-kube-proxy\") pod \"kube-proxy-ngjzh\" (UID: \"41ec3a81-9593-4478-8313-a684b8b44f34\") " pod="kube-system/kube-proxy-ngjzh" May 13 00:29:49.722242 env[1213]: time="2025-05-13T00:29:49.722181947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-n2n2h,Uid:4b2af6b9-3a8c-41d6-8338-9994f5172dd7,Namespace:tigera-operator,Attempt:0,}" May 13 00:29:49.736195 env[1213]: time="2025-05-13T00:29:49.736132395Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:49.736382 env[1213]: time="2025-05-13T00:29:49.736355445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:49.736480 env[1213]: time="2025-05-13T00:29:49.736459591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:49.736747 env[1213]: time="2025-05-13T00:29:49.736717036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a pid=2162 runtime=io.containerd.runc.v2 May 13 00:29:49.748208 systemd[1]: run-containerd-runc-k8s.io-9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a-runc.ObwwaW.mount: Deactivated successfully. May 13 00:29:49.754443 systemd[1]: Started cri-containerd-9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a.scope. May 13 00:29:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780781 kernel: audit: type=1400 audit(1747096189.775:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780823 kernel: audit: type=1400 audit(1747096189.775:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783358 kernel: audit: type=1400 audit(1747096189.775:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783431 kernel: audit: type=1400 audit(1747096189.775:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.788283 kernel: audit: type=1400 audit(1747096189.775:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.788339 kernel: audit: type=1400 audit(1747096189.775:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.793650 kernel: audit: type=1400 audit(1747096189.775:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.796392 kernel: audit: type=1400 audit(1747096189.775:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.803765 kernel: audit: type=1400 audit(1747096189.775:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.803857 kernel: audit: type=1400 audit(1747096189.777:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.777000 audit: BPF prog-id=100 op=LOAD May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:49.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373166396537383936613065623463313630613839323432623932 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:49.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373166396537383936613065623463313630613839323432623932 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.780000 audit: BPF prog-id=101 op=LOAD May 13 00:29:49.780000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:49.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373166396537383936613065623463313630613839323432623932 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.783000 audit: BPF prog-id=102 op=LOAD May 13 00:29:49.783000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:49.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373166396537383936613065623463313630613839323432623932 May 13 00:29:49.785000 audit: BPF prog-id=102 op=UNLOAD May 13 00:29:49.785000 audit: BPF prog-id=101 op=UNLOAD May 13 00:29:49.785000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:49.785000 audit: BPF prog-id=103 op=LOAD May 13 00:29:49.785000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:49.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373166396537383936613065623463313630613839323432623932 May 13 00:29:49.817241 env[1213]: time="2025-05-13T00:29:49.817095127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-n2n2h,Uid:4b2af6b9-3a8c-41d6-8338-9994f5172dd7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a\"" May 13 00:29:49.820909 env[1213]: time="2025-05-13T00:29:49.819846078Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:29:50.576469 kubelet[2050]: E0513 00:29:50.576423 2050 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 13 00:29:50.576469 kubelet[2050]: E0513 00:29:50.576462 2050 projected.go:200] Error preparing data for projected volume kube-api-access-vpwbc for pod kube-system/kube-proxy-ngjzh: failed to sync configmap cache: timed out waiting for the condition May 13 00:29:50.576826 kubelet[2050]: E0513 00:29:50.576543 2050 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/41ec3a81-9593-4478-8313-a684b8b44f34-kube-api-access-vpwbc podName:41ec3a81-9593-4478-8313-a684b8b44f34 nodeName:}" failed. No retries permitted until 2025-05-13 00:29:51.076517743 +0000 UTC m=+17.281628715 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-vpwbc" (UniqueName: "kubernetes.io/projected/41ec3a81-9593-4478-8313-a684b8b44f34-kube-api-access-vpwbc") pod "kube-proxy-ngjzh" (UID: "41ec3a81-9593-4478-8313-a684b8b44f34") : failed to sync configmap cache: timed out waiting for the condition May 13 00:29:51.086367 kubelet[2050]: E0513 00:29:51.086329 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:51.092119 env[1213]: time="2025-05-13T00:29:51.092060347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ngjzh,Uid:41ec3a81-9593-4478-8313-a684b8b44f34,Namespace:kube-system,Attempt:0,}" May 13 00:29:51.109596 env[1213]: time="2025-05-13T00:29:51.109410060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:51.109596 env[1213]: time="2025-05-13T00:29:51.109446895Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:51.109596 env[1213]: time="2025-05-13T00:29:51.109457294Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:51.109832 env[1213]: time="2025-05-13T00:29:51.109621635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503 pid=2202 runtime=io.containerd.runc.v2 May 13 00:29:51.132729 systemd[1]: Started cri-containerd-14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503.scope. May 13 00:29:51.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit: BPF prog-id=104 op=LOAD May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2202 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633463346637323561643565356363663066336533353061346663 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2202 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633463346637323561643565356363663066336533353061346663 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.160000 audit: BPF prog-id=105 op=LOAD May 13 00:29:51.160000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2202 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633463346637323561643565356363663066336533353061346663 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit: BPF prog-id=106 op=LOAD May 13 00:29:51.161000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2202 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633463346637323561643565356363663066336533353061346663 May 13 00:29:51.161000 audit: BPF prog-id=106 op=UNLOAD May 13 00:29:51.161000 audit: BPF prog-id=105 op=UNLOAD May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.161000 audit: BPF prog-id=107 op=LOAD May 13 00:29:51.161000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2202 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633463346637323561643565356363663066336533353061346663 May 13 00:29:51.174612 env[1213]: time="2025-05-13T00:29:51.174569733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ngjzh,Uid:41ec3a81-9593-4478-8313-a684b8b44f34,Namespace:kube-system,Attempt:0,} returns sandbox id \"14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503\"" May 13 00:29:51.176409 kubelet[2050]: E0513 00:29:51.175149 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:51.180663 env[1213]: time="2025-05-13T00:29:51.180594622Z" level=info msg="CreateContainer within sandbox \"14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:29:51.193907 env[1213]: time="2025-05-13T00:29:51.193870096Z" level=info msg="CreateContainer within sandbox \"14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"353015af53d7051c20f587feb692af05db25d30e6f20f28166d7f2933d87f009\"" May 13 00:29:51.195629 env[1213]: time="2025-05-13T00:29:51.195591133Z" level=info msg="StartContainer for \"353015af53d7051c20f587feb692af05db25d30e6f20f28166d7f2933d87f009\"" May 13 00:29:51.211862 systemd[1]: Started cri-containerd-353015af53d7051c20f587feb692af05db25d30e6f20f28166d7f2933d87f009.scope. May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2202 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333031356166353364373035316332306635383766656236393261 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.241000 audit: BPF prog-id=108 op=LOAD May 13 00:29:51.241000 audit[2243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2202 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333031356166353364373035316332306635383766656236393261 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.242000 audit: BPF prog-id=109 op=LOAD May 13 00:29:51.242000 audit[2243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2202 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333031356166353364373035316332306635383766656236393261 May 13 00:29:51.244000 audit: BPF prog-id=109 op=UNLOAD May 13 00:29:51.244000 audit: BPF prog-id=108 op=UNLOAD May 13 00:29:51.244000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.244000 audit: BPF prog-id=110 op=LOAD May 13 00:29:51.244000 audit[2243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2202 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333031356166353364373035316332306635383766656236393261 May 13 00:29:51.258042 env[1213]: time="2025-05-13T00:29:51.258004769Z" level=info msg="StartContainer for \"353015af53d7051c20f587feb692af05db25d30e6f20f28166d7f2933d87f009\" returns successfully" May 13 00:29:51.372000 audit[2297]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.372000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeee64e20 a2=0 a3=1 items=0 ppid=2254 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:29:51.372000 audit[2296]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.372000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1f1edb0 a2=0 a3=1 items=0 ppid=2254 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:29:51.375000 audit[2298]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.375000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe53ee1f0 a2=0 a3=1 items=0 ppid=2254 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:29:51.377000 audit[2299]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.377000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3c5dfe0 a2=0 a3=1 items=0 ppid=2254 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:29:51.378000 audit[2301]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.378000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff604c550 a2=0 a3=1 items=0 ppid=2254 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:29:51.378000 audit[2300]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.378000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7115b60 a2=0 a3=1 items=0 ppid=2254 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:29:51.476000 audit[2302]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.476000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffe41e7f0 a2=0 a3=1 items=0 ppid=2254 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:29:51.481000 audit[2304]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.481000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee1ee240 a2=0 a3=1 items=0 ppid=2254 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:29:51.484000 audit[2307]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.484000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb023800 a2=0 a3=1 items=0 ppid=2254 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:29:51.485000 audit[2308]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.485000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd8a7980 a2=0 a3=1 items=0 ppid=2254 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:29:51.487000 audit[2310]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.487000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdfeffa50 a2=0 a3=1 items=0 ppid=2254 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:29:51.488000 audit[2311]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.488000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd2bb0c0 a2=0 a3=1 items=0 ppid=2254 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:29:51.490000 audit[2313]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.490000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffea3217d0 a2=0 a3=1 items=0 ppid=2254 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:29:51.493000 audit[2316]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.493000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4fb79d0 a2=0 a3=1 items=0 ppid=2254 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:29:51.494000 audit[2317]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.494000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd055db0 a2=0 a3=1 items=0 ppid=2254 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:29:51.497000 audit[2319]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.497000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec30a080 a2=0 a3=1 items=0 ppid=2254 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:29:51.497000 audit[2320]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.497000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd039d370 a2=0 a3=1 items=0 ppid=2254 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:29:51.500000 audit[2322]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.500000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2b3d460 a2=0 a3=1 items=0 ppid=2254 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:29:51.503000 audit[2325]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.503000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd762d850 a2=0 a3=1 items=0 ppid=2254 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:29:51.506000 audit[2328]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.506000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd222cc50 a2=0 a3=1 items=0 ppid=2254 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:29:51.507000 audit[2329]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.507000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffe905e90 a2=0 a3=1 items=0 ppid=2254 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:29:51.510000 audit[2331]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.510000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd827a8f0 a2=0 a3=1 items=0 ppid=2254 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:29:51.513000 audit[2334]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.513000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3d3d640 a2=0 a3=1 items=0 ppid=2254 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:29:51.513000 audit[2335]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.513000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8a1c710 a2=0 a3=1 items=0 ppid=2254 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:29:51.516000 audit[2337]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:29:51.516000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff8b1cc10 a2=0 a3=1 items=0 ppid=2254 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:29:51.540000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:51.540000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffffbd80ff0 a2=0 a3=1 items=0 ppid=2254 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:51.551000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:51.551000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffffbd80ff0 a2=0 a3=1 items=0 ppid=2254 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:51.552000 audit[2348]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.552000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd0ab8cb0 a2=0 a3=1 items=0 ppid=2254 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:29:51.555000 audit[2350]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.555000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe6fe71d0 a2=0 a3=1 items=0 ppid=2254 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:29:51.558000 audit[2353]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.558000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff9413cc0 a2=0 a3=1 items=0 ppid=2254 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:29:51.559000 audit[2354]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.559000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4914940 a2=0 a3=1 items=0 ppid=2254 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:29:51.561000 audit[2356]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.561000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffae4ef10 a2=0 a3=1 items=0 ppid=2254 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:29:51.562000 audit[2357]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.562000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc353c60 a2=0 a3=1 items=0 ppid=2254 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:29:51.564000 audit[2359]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.564000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdf03dac0 a2=0 a3=1 items=0 ppid=2254 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:29:51.567000 audit[2362]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.567000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdc3c8810 a2=0 a3=1 items=0 ppid=2254 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:29:51.568000 audit[2363]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.568000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce297f60 a2=0 a3=1 items=0 ppid=2254 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:29:51.570000 audit[2365]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.570000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9cc9370 a2=0 a3=1 items=0 ppid=2254 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:29:51.571000 audit[2366]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.571000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd472ba90 a2=0 a3=1 items=0 ppid=2254 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:29:51.573000 audit[2368]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.573000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7163320 a2=0 a3=1 items=0 ppid=2254 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:29:51.576000 audit[2371]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.576000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe644c090 a2=0 a3=1 items=0 ppid=2254 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:29:51.581000 audit[2374]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.581000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdcf26300 a2=0 a3=1 items=0 ppid=2254 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:29:51.582000 audit[2375]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.582000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb156c90 a2=0 a3=1 items=0 ppid=2254 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:29:51.584000 audit[2377]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.584000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffff62f8f0 a2=0 a3=1 items=0 ppid=2254 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:29:51.587000 audit[2380]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.587000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd7a85b20 a2=0 a3=1 items=0 ppid=2254 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:29:51.588000 audit[2381]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.588000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9dacee0 a2=0 a3=1 items=0 ppid=2254 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:29:51.590000 audit[2383]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.590000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff2781270 a2=0 a3=1 items=0 ppid=2254 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:29:51.591000 audit[2384]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.591000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffaa6bb10 a2=0 a3=1 items=0 ppid=2254 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:29:51.593000 audit[2386]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.593000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff880d5d0 a2=0 a3=1 items=0 ppid=2254 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:29:51.596000 audit[2389]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:29:51.596000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec754b40 a2=0 a3=1 items=0 ppid=2254 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:29:51.598000 audit[2391]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:29:51.598000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffdad60420 a2=0 a3=1 items=0 ppid=2254 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.598000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:51.599000 audit[2391]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:29:51.599000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdad60420 a2=0 a3=1 items=0 ppid=2254 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.599000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:51.865748 env[1213]: time="2025-05-13T00:29:51.865691478Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:51.867794 env[1213]: time="2025-05-13T00:29:51.867757754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:51.869102 env[1213]: time="2025-05-13T00:29:51.869068039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:51.870807 env[1213]: time="2025-05-13T00:29:51.870779158Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:51.872083 env[1213]: time="2025-05-13T00:29:51.872056167Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 13 00:29:51.876283 env[1213]: time="2025-05-13T00:29:51.876246393Z" level=info msg="CreateContainer within sandbox \"9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:29:51.886607 env[1213]: time="2025-05-13T00:29:51.886563575Z" level=info msg="CreateContainer within sandbox \"9e71f9e7896a0eb4c160a89242b92db56ff2c712be2959d6346cc316ca8fa18a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"75df84d601a4160849e8e56c2c16a63d8c223cc881b6c0dcd67bd391e2f0abf1\"" May 13 00:29:51.888161 env[1213]: time="2025-05-13T00:29:51.887088074Z" level=info msg="StartContainer for \"75df84d601a4160849e8e56c2c16a63d8c223cc881b6c0dcd67bd391e2f0abf1\"" May 13 00:29:51.901198 systemd[1]: Started cri-containerd-75df84d601a4160849e8e56c2c16a63d8c223cc881b6c0dcd67bd391e2f0abf1.scope. May 13 00:29:51.920490 kubelet[2050]: E0513 00:29:51.920455 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:51.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit: BPF prog-id=111 op=LOAD May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2162 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735646638346436303161343136303834396538653536633263313661 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2162 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735646638346436303161343136303834396538653536633263313661 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.937000 audit: BPF prog-id=112 op=LOAD May 13 00:29:51.937000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2162 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735646638346436303161343136303834396538653536633263313661 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit: BPF prog-id=113 op=LOAD May 13 00:29:51.938000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2162 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735646638346436303161343136303834396538653536633263313661 May 13 00:29:51.938000 audit: BPF prog-id=113 op=UNLOAD May 13 00:29:51.938000 audit: BPF prog-id=112 op=UNLOAD May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:51.938000 audit: BPF prog-id=114 op=LOAD May 13 00:29:51.938000 audit[2399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2162 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:51.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735646638346436303161343136303834396538653536633263313661 May 13 00:29:51.952640 env[1213]: time="2025-05-13T00:29:51.952593266Z" level=info msg="StartContainer for \"75df84d601a4160849e8e56c2c16a63d8c223cc881b6c0dcd67bd391e2f0abf1\" returns successfully" May 13 00:29:52.082827 systemd[1]: run-containerd-runc-k8s.io-14c4c4f725ad5e5ccf0f3e350a4fc6040298e54f0fc2d6732f6fe7a3e2ebf503-runc.Tl4Hgs.mount: Deactivated successfully. May 13 00:29:52.930446 kubelet[2050]: I0513 00:29:52.930381 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ngjzh" podStartSLOduration=3.930363723 podStartE2EDuration="3.930363723s" podCreationTimestamp="2025-05-13 00:29:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:29:51.929741642 +0000 UTC m=+18.134852614" watchObservedRunningTime="2025-05-13 00:29:52.930363723 +0000 UTC m=+19.135474695" May 13 00:29:53.894722 kubelet[2050]: I0513 00:29:53.894534 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-n2n2h" podStartSLOduration=2.84111868 podStartE2EDuration="4.894497345s" podCreationTimestamp="2025-05-13 00:29:49 +0000 UTC" firstStartedPulling="2025-05-13 00:29:49.819424734 +0000 UTC m=+16.024535666" lastFinishedPulling="2025-05-13 00:29:51.872803359 +0000 UTC m=+18.077914331" observedRunningTime="2025-05-13 00:29:52.931380171 +0000 UTC m=+19.136491143" watchObservedRunningTime="2025-05-13 00:29:53.894497345 +0000 UTC m=+20.099608317" May 13 00:29:55.093000 audit[2432]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.096616 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 00:29:55.096710 kernel: audit: type=1325 audit(1747096195.093:924): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.093000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff2ecfe80 a2=0 a3=1 items=0 ppid=2254 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.102986 kernel: audit: type=1300 audit(1747096195.093:924): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff2ecfe80 a2=0 a3=1 items=0 ppid=2254 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.103052 kernel: audit: type=1327 audit(1747096195.093:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.109000 audit[2432]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.109000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff2ecfe80 a2=0 a3=1 items=0 ppid=2254 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.118500 kernel: audit: type=1325 audit(1747096195.109:925): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.118589 kernel: audit: type=1300 audit(1747096195.109:925): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff2ecfe80 a2=0 a3=1 items=0 ppid=2254 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.118620 kernel: audit: type=1327 audit(1747096195.109:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.129000 audit[2434]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.129000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffca4ed320 a2=0 a3=1 items=0 ppid=2254 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.137145 kernel: audit: type=1325 audit(1747096195.129:926): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.137200 kernel: audit: type=1300 audit(1747096195.129:926): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffca4ed320 a2=0 a3=1 items=0 ppid=2254 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.137233 kernel: audit: type=1327 audit(1747096195.129:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.142000 audit[2434]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:55.142000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffca4ed320 a2=0 a3=1 items=0 ppid=2254 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:55.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:55.146537 kernel: audit: type=1325 audit(1747096195.142:927): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:56.107313 kubelet[2050]: I0513 00:29:56.107267 2050 topology_manager.go:215] "Topology Admit Handler" podUID="8092de62-68fd-475a-990f-c37b0459eb1c" podNamespace="calico-system" podName="calico-typha-79dbbc8b6d-bhwsf" May 13 00:29:56.112338 systemd[1]: Created slice kubepods-besteffort-pod8092de62_68fd_475a_990f_c37b0459eb1c.slice. May 13 00:29:56.135000 audit[2436]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:56.135000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffe257c710 a2=0 a3=1 items=0 ppid=2254 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:56.143000 audit[2436]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:56.143000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe257c710 a2=0 a3=1 items=0 ppid=2254 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:56.212389 kubelet[2050]: I0513 00:29:56.212343 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8092de62-68fd-475a-990f-c37b0459eb1c-tigera-ca-bundle\") pod \"calico-typha-79dbbc8b6d-bhwsf\" (UID: \"8092de62-68fd-475a-990f-c37b0459eb1c\") " pod="calico-system/calico-typha-79dbbc8b6d-bhwsf" May 13 00:29:56.212389 kubelet[2050]: I0513 00:29:56.212390 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8092de62-68fd-475a-990f-c37b0459eb1c-typha-certs\") pod \"calico-typha-79dbbc8b6d-bhwsf\" (UID: \"8092de62-68fd-475a-990f-c37b0459eb1c\") " pod="calico-system/calico-typha-79dbbc8b6d-bhwsf" May 13 00:29:56.212650 kubelet[2050]: I0513 00:29:56.212409 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2fnf\" (UniqueName: \"kubernetes.io/projected/8092de62-68fd-475a-990f-c37b0459eb1c-kube-api-access-w2fnf\") pod \"calico-typha-79dbbc8b6d-bhwsf\" (UID: \"8092de62-68fd-475a-990f-c37b0459eb1c\") " pod="calico-system/calico-typha-79dbbc8b6d-bhwsf" May 13 00:29:56.289063 kubelet[2050]: I0513 00:29:56.289010 2050 topology_manager.go:215] "Topology Admit Handler" podUID="ea76f3bd-a668-4c60-ab97-27447db514a4" podNamespace="calico-system" podName="calico-node-x8shn" May 13 00:29:56.294777 systemd[1]: Created slice kubepods-besteffort-podea76f3bd_a668_4c60_ab97_27447db514a4.slice. May 13 00:29:56.413981 kubelet[2050]: I0513 00:29:56.413872 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-var-lib-calico\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.413981 kubelet[2050]: I0513 00:29:56.413913 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-policysync\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.413981 kubelet[2050]: I0513 00:29:56.413945 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-cni-log-dir\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.413981 kubelet[2050]: I0513 00:29:56.413961 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-lib-modules\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.413981 kubelet[2050]: I0513 00:29:56.413985 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ea76f3bd-a668-4c60-ab97-27447db514a4-tigera-ca-bundle\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414205 kubelet[2050]: I0513 00:29:56.414011 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ea76f3bd-a668-4c60-ab97-27447db514a4-node-certs\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414205 kubelet[2050]: I0513 00:29:56.414028 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-cni-net-dir\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414205 kubelet[2050]: I0513 00:29:56.414045 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-flexvol-driver-host\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414205 kubelet[2050]: I0513 00:29:56.414065 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-cni-bin-dir\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414205 kubelet[2050]: I0513 00:29:56.414093 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-var-run-calico\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414329 kubelet[2050]: I0513 00:29:56.414109 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h2rs9\" (UniqueName: \"kubernetes.io/projected/ea76f3bd-a668-4c60-ab97-27447db514a4-kube-api-access-h2rs9\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.414329 kubelet[2050]: I0513 00:29:56.414124 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ea76f3bd-a668-4c60-ab97-27447db514a4-xtables-lock\") pod \"calico-node-x8shn\" (UID: \"ea76f3bd-a668-4c60-ab97-27447db514a4\") " pod="calico-system/calico-node-x8shn" May 13 00:29:56.415068 kubelet[2050]: E0513 00:29:56.415045 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:56.416082 env[1213]: time="2025-05-13T00:29:56.415635260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79dbbc8b6d-bhwsf,Uid:8092de62-68fd-475a-990f-c37b0459eb1c,Namespace:calico-system,Attempt:0,}" May 13 00:29:56.440649 env[1213]: time="2025-05-13T00:29:56.439956102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:56.440649 env[1213]: time="2025-05-13T00:29:56.440008338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:56.440649 env[1213]: time="2025-05-13T00:29:56.440026696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:56.440649 env[1213]: time="2025-05-13T00:29:56.440191042Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95d0ac7783aace18bdaafa76fd599d3d8a5cb41d187bcddf9a29425c0da2c6a9 pid=2446 runtime=io.containerd.runc.v2 May 13 00:29:56.455998 systemd[1]: Started cri-containerd-95d0ac7783aace18bdaafa76fd599d3d8a5cb41d187bcddf9a29425c0da2c6a9.scope. May 13 00:29:56.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.492000 audit: BPF prog-id=115 op=LOAD May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000197b38 a2=10 a3=0 items=0 ppid=2446 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643061633737383361616365313862646161666137366664353939 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001975a0 a2=3c a3=0 items=0 ppid=2446 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643061633737383361616365313862646161666137366664353939 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit: BPF prog-id=116 op=LOAD May 13 00:29:56.496000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001978e0 a2=78 a3=0 items=0 ppid=2446 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643061633737383361616365313862646161666137366664353939 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit: BPF prog-id=117 op=LOAD May 13 00:29:56.496000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000197670 a2=78 a3=0 items=0 ppid=2446 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643061633737383361616365313862646161666137366664353939 May 13 00:29:56.496000 audit: BPF prog-id=117 op=UNLOAD May 13 00:29:56.496000 audit: BPF prog-id=116 op=UNLOAD May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.496000 audit: BPF prog-id=118 op=LOAD May 13 00:29:56.496000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000197b40 a2=78 a3=0 items=0 ppid=2446 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643061633737383361616365313862646161666137366664353939 May 13 00:29:56.500145 kubelet[2050]: I0513 00:29:56.499621 2050 topology_manager.go:215] "Topology Admit Handler" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" podNamespace="calico-system" podName="csi-node-driver-z485v" May 13 00:29:56.500145 kubelet[2050]: E0513 00:29:56.499868 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:29:56.516984 kubelet[2050]: I0513 00:29:56.514387 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0-socket-dir\") pod \"csi-node-driver-z485v\" (UID: \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\") " pod="calico-system/csi-node-driver-z485v" May 13 00:29:56.516984 kubelet[2050]: I0513 00:29:56.514453 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0-kubelet-dir\") pod \"csi-node-driver-z485v\" (UID: \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\") " pod="calico-system/csi-node-driver-z485v" May 13 00:29:56.516984 kubelet[2050]: I0513 00:29:56.514479 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0-varrun\") pod \"csi-node-driver-z485v\" (UID: \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\") " pod="calico-system/csi-node-driver-z485v" May 13 00:29:56.516984 kubelet[2050]: I0513 00:29:56.514532 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ddfn5\" (UniqueName: \"kubernetes.io/projected/3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0-kube-api-access-ddfn5\") pod \"csi-node-driver-z485v\" (UID: \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\") " pod="calico-system/csi-node-driver-z485v" May 13 00:29:56.516984 kubelet[2050]: I0513 00:29:56.514613 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0-registration-dir\") pod \"csi-node-driver-z485v\" (UID: \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\") " pod="calico-system/csi-node-driver-z485v" May 13 00:29:56.521635 kubelet[2050]: E0513 00:29:56.521596 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.521635 kubelet[2050]: W0513 00:29:56.521626 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.521811 kubelet[2050]: E0513 00:29:56.521654 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.521989 kubelet[2050]: E0513 00:29:56.521880 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.521989 kubelet[2050]: W0513 00:29:56.521889 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.522060 kubelet[2050]: E0513 00:29:56.522015 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.522060 kubelet[2050]: W0513 00:29:56.522022 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.522287 kubelet[2050]: E0513 00:29:56.522133 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.522287 kubelet[2050]: E0513 00:29:56.522152 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.522287 kubelet[2050]: E0513 00:29:56.522145 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.522287 kubelet[2050]: W0513 00:29:56.522175 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.522287 kubelet[2050]: E0513 00:29:56.522188 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.522551 kubelet[2050]: E0513 00:29:56.522532 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.522799 kubelet[2050]: W0513 00:29:56.522652 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.522799 kubelet[2050]: E0513 00:29:56.522670 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.522945 kubelet[2050]: E0513 00:29:56.522933 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.523005 kubelet[2050]: W0513 00:29:56.522994 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.523068 kubelet[2050]: E0513 00:29:56.523057 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.525641 env[1213]: time="2025-05-13T00:29:56.525599745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79dbbc8b6d-bhwsf,Uid:8092de62-68fd-475a-990f-c37b0459eb1c,Namespace:calico-system,Attempt:0,} returns sandbox id \"95d0ac7783aace18bdaafa76fd599d3d8a5cb41d187bcddf9a29425c0da2c6a9\"" May 13 00:29:56.526569 kubelet[2050]: E0513 00:29:56.526547 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:56.527949 env[1213]: time="2025-05-13T00:29:56.527918987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:29:56.528091 kubelet[2050]: E0513 00:29:56.528075 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.528158 kubelet[2050]: W0513 00:29:56.528146 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.528219 kubelet[2050]: E0513 00:29:56.528207 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.597919 kubelet[2050]: E0513 00:29:56.597432 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:56.598577 env[1213]: time="2025-05-13T00:29:56.598542073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x8shn,Uid:ea76f3bd-a668-4c60-ab97-27447db514a4,Namespace:calico-system,Attempt:0,}" May 13 00:29:56.613373 env[1213]: time="2025-05-13T00:29:56.613226419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:29:56.613373 env[1213]: time="2025-05-13T00:29:56.613284174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:29:56.613373 env[1213]: time="2025-05-13T00:29:56.613294533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:29:56.613616 env[1213]: time="2025-05-13T00:29:56.613438881Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8 pid=2495 runtime=io.containerd.runc.v2 May 13 00:29:56.616468 kubelet[2050]: E0513 00:29:56.616245 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.616468 kubelet[2050]: W0513 00:29:56.616269 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.616468 kubelet[2050]: E0513 00:29:56.616289 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.617195 kubelet[2050]: E0513 00:29:56.616858 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.617195 kubelet[2050]: W0513 00:29:56.616872 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.617195 kubelet[2050]: E0513 00:29:56.616895 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.618058 kubelet[2050]: E0513 00:29:56.617874 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.618058 kubelet[2050]: W0513 00:29:56.617889 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.618058 kubelet[2050]: E0513 00:29:56.617913 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.618386 kubelet[2050]: E0513 00:29:56.618269 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.618386 kubelet[2050]: W0513 00:29:56.618282 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.618386 kubelet[2050]: E0513 00:29:56.618297 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.618793 kubelet[2050]: E0513 00:29:56.618690 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.618793 kubelet[2050]: W0513 00:29:56.618704 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.618793 kubelet[2050]: E0513 00:29:56.618770 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.627431 kubelet[2050]: E0513 00:29:56.618958 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.627431 kubelet[2050]: W0513 00:29:56.618970 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.627431 kubelet[2050]: E0513 00:29:56.619007 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.627431 kubelet[2050]: E0513 00:29:56.627157 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.627431 kubelet[2050]: W0513 00:29:56.627232 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.627431 kubelet[2050]: E0513 00:29:56.627252 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.627823 kubelet[2050]: E0513 00:29:56.627723 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.627823 kubelet[2050]: W0513 00:29:56.627739 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.627823 kubelet[2050]: E0513 00:29:56.627797 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.628073 kubelet[2050]: E0513 00:29:56.627985 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.628073 kubelet[2050]: W0513 00:29:56.627998 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.628073 kubelet[2050]: E0513 00:29:56.628047 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.628353 kubelet[2050]: E0513 00:29:56.628217 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.628353 kubelet[2050]: W0513 00:29:56.628228 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.628353 kubelet[2050]: E0513 00:29:56.628311 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.628988 kubelet[2050]: E0513 00:29:56.628592 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.628988 kubelet[2050]: W0513 00:29:56.628612 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.629907 systemd[1]: Started cri-containerd-b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8.scope. May 13 00:29:56.631569 kubelet[2050]: E0513 00:29:56.628753 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.631637 kubelet[2050]: E0513 00:29:56.629263 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.631637 kubelet[2050]: W0513 00:29:56.631591 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.631749 kubelet[2050]: E0513 00:29:56.631734 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.631848 kubelet[2050]: E0513 00:29:56.631827 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.631848 kubelet[2050]: W0513 00:29:56.631845 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.631908 kubelet[2050]: E0513 00:29:56.631880 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.632021 kubelet[2050]: E0513 00:29:56.632006 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.632021 kubelet[2050]: W0513 00:29:56.632017 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.632096 kubelet[2050]: E0513 00:29:56.632041 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.632264 kubelet[2050]: E0513 00:29:56.632246 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.632264 kubelet[2050]: W0513 00:29:56.632259 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.632388 kubelet[2050]: E0513 00:29:56.632286 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.632422 kubelet[2050]: E0513 00:29:56.632398 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.632422 kubelet[2050]: W0513 00:29:56.632407 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.632467 kubelet[2050]: E0513 00:29:56.632424 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.635111 kubelet[2050]: E0513 00:29:56.633792 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.635111 kubelet[2050]: W0513 00:29:56.633812 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.635111 kubelet[2050]: E0513 00:29:56.633844 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.639556 kubelet[2050]: E0513 00:29:56.636994 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.639556 kubelet[2050]: W0513 00:29:56.637019 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.639556 kubelet[2050]: E0513 00:29:56.637112 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.641763 kubelet[2050]: E0513 00:29:56.641742 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.641763 kubelet[2050]: W0513 00:29:56.641762 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.641902 kubelet[2050]: E0513 00:29:56.641868 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.641999 kubelet[2050]: E0513 00:29:56.641984 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.641999 kubelet[2050]: W0513 00:29:56.641996 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.642123 kubelet[2050]: E0513 00:29:56.642078 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.642185 kubelet[2050]: E0513 00:29:56.642171 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.642185 kubelet[2050]: W0513 00:29:56.642182 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.642298 kubelet[2050]: E0513 00:29:56.642262 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.642350 kubelet[2050]: E0513 00:29:56.642339 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.642350 kubelet[2050]: W0513 00:29:56.642346 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.642411 kubelet[2050]: E0513 00:29:56.642388 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.642534 kubelet[2050]: E0513 00:29:56.642520 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.642534 kubelet[2050]: W0513 00:29:56.642532 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.642598 kubelet[2050]: E0513 00:29:56.642547 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.642749 kubelet[2050]: E0513 00:29:56.642739 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.642749 kubelet[2050]: W0513 00:29:56.642748 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.642814 kubelet[2050]: E0513 00:29:56.642763 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.644287 kubelet[2050]: E0513 00:29:56.644105 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.644287 kubelet[2050]: W0513 00:29:56.644123 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.644287 kubelet[2050]: E0513 00:29:56.644180 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.653182 kubelet[2050]: E0513 00:29:56.653160 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:56.653182 kubelet[2050]: W0513 00:29:56.653178 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:56.653315 kubelet[2050]: E0513 00:29:56.653192 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:56.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.678000 audit: BPF prog-id=119 op=LOAD May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2495 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230663962626639333263306532636230623433343835386234326534 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2495 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230663962626639333263306532636230623433343835386234326534 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit: BPF prog-id=120 op=LOAD May 13 00:29:56.681000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2495 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230663962626639333263306532636230623433343835386234326534 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit: BPF prog-id=121 op=LOAD May 13 00:29:56.681000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2495 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230663962626639333263306532636230623433343835386234326534 May 13 00:29:56.681000 audit: BPF prog-id=121 op=UNLOAD May 13 00:29:56.681000 audit: BPF prog-id=120 op=UNLOAD May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:56.681000 audit: BPF prog-id=122 op=LOAD May 13 00:29:56.681000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2495 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230663962626639333263306532636230623433343835386234326534 May 13 00:29:56.694258 env[1213]: time="2025-05-13T00:29:56.694204061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x8shn,Uid:ea76f3bd-a668-4c60-ab97-27447db514a4,Namespace:calico-system,Attempt:0,} returns sandbox id \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\"" May 13 00:29:56.697612 kubelet[2050]: E0513 00:29:56.697587 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:57.162000 audit[2557]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:57.162000 audit[2557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffcc6bc050 a2=0 a3=1 items=0 ppid=2254 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:57.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:57.174000 audit[2557]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:57.174000 audit[2557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcc6bc050 a2=0 a3=1 items=0 ppid=2254 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:57.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:57.881586 kubelet[2050]: E0513 00:29:57.881544 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:29:58.188798 env[1213]: time="2025-05-13T00:29:58.188692028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:58.190154 env[1213]: time="2025-05-13T00:29:58.190120400Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:58.191591 env[1213]: time="2025-05-13T00:29:58.191556732Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:58.193051 env[1213]: time="2025-05-13T00:29:58.193024062Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:58.193476 env[1213]: time="2025-05-13T00:29:58.193444951Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 13 00:29:58.201992 env[1213]: time="2025-05-13T00:29:58.201964871Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:29:58.220720 env[1213]: time="2025-05-13T00:29:58.220678826Z" level=info msg="CreateContainer within sandbox \"95d0ac7783aace18bdaafa76fd599d3d8a5cb41d187bcddf9a29425c0da2c6a9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:29:58.237519 env[1213]: time="2025-05-13T00:29:58.237448287Z" level=info msg="CreateContainer within sandbox \"95d0ac7783aace18bdaafa76fd599d3d8a5cb41d187bcddf9a29425c0da2c6a9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"cb7c1a0c8a590701dbcd5376dadf855079549b54b7c9af92b742c674b5482f3a\"" May 13 00:29:58.238054 env[1213]: time="2025-05-13T00:29:58.238025963Z" level=info msg="StartContainer for \"cb7c1a0c8a590701dbcd5376dadf855079549b54b7c9af92b742c674b5482f3a\"" May 13 00:29:58.261825 systemd[1]: Started cri-containerd-cb7c1a0c8a590701dbcd5376dadf855079549b54b7c9af92b742c674b5482f3a.scope. May 13 00:29:58.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.291000 audit: BPF prog-id=123 op=LOAD May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2446 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376331613063386135393037303164626364353337366461646638 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2446 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376331613063386135393037303164626364353337366461646638 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit: BPF prog-id=124 op=LOAD May 13 00:29:58.292000 audit[2567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2446 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376331613063386135393037303164626364353337366461646638 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit: BPF prog-id=125 op=LOAD May 13 00:29:58.292000 audit[2567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2446 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376331613063386135393037303164626364353337366461646638 May 13 00:29:58.292000 audit: BPF prog-id=125 op=UNLOAD May 13 00:29:58.292000 audit: BPF prog-id=124 op=UNLOAD May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:58.292000 audit: BPF prog-id=126 op=LOAD May 13 00:29:58.292000 audit[2567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2446 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376331613063386135393037303164626364353337366461646638 May 13 00:29:58.337890 env[1213]: time="2025-05-13T00:29:58.337841188Z" level=info msg="StartContainer for \"cb7c1a0c8a590701dbcd5376dadf855079549b54b7c9af92b742c674b5482f3a\" returns successfully" May 13 00:29:58.935981 kubelet[2050]: E0513 00:29:58.935912 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:58.965730 kubelet[2050]: I0513 00:29:58.965669 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-79dbbc8b6d-bhwsf" podStartSLOduration=1.291650562 podStartE2EDuration="2.965651927s" podCreationTimestamp="2025-05-13 00:29:56 +0000 UTC" firstStartedPulling="2025-05-13 00:29:56.527632731 +0000 UTC m=+22.732743703" lastFinishedPulling="2025-05-13 00:29:58.201634096 +0000 UTC m=+24.406745068" observedRunningTime="2025-05-13 00:29:58.964757235 +0000 UTC m=+25.169868167" watchObservedRunningTime="2025-05-13 00:29:58.965651927 +0000 UTC m=+25.170762859" May 13 00:29:58.990000 audit[2601]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:58.990000 audit[2601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd44b5ed0 a2=0 a3=1 items=0 ppid=2254 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:58.998000 audit[2601]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:29:58.998000 audit[2601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd44b5ed0 a2=0 a3=1 items=0 ppid=2254 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:58.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:29:59.032618 kubelet[2050]: E0513 00:29:59.032590 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.032830 kubelet[2050]: W0513 00:29:59.032812 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.032924 kubelet[2050]: E0513 00:29:59.032910 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.033210 kubelet[2050]: E0513 00:29:59.033198 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.033322 kubelet[2050]: W0513 00:29:59.033308 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.033414 kubelet[2050]: E0513 00:29:59.033402 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.033690 kubelet[2050]: E0513 00:29:59.033676 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.033800 kubelet[2050]: W0513 00:29:59.033787 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.033886 kubelet[2050]: E0513 00:29:59.033873 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.034126 kubelet[2050]: E0513 00:29:59.034114 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.034217 kubelet[2050]: W0513 00:29:59.034204 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.034302 kubelet[2050]: E0513 00:29:59.034283 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.034583 kubelet[2050]: E0513 00:29:59.034571 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.034689 kubelet[2050]: W0513 00:29:59.034675 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.034772 kubelet[2050]: E0513 00:29:59.034761 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.035005 kubelet[2050]: E0513 00:29:59.034994 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.035095 kubelet[2050]: W0513 00:29:59.035082 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.035170 kubelet[2050]: E0513 00:29:59.035159 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.035427 kubelet[2050]: E0513 00:29:59.035415 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.035536 kubelet[2050]: W0513 00:29:59.035523 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.035623 kubelet[2050]: E0513 00:29:59.035610 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.035857 kubelet[2050]: E0513 00:29:59.035846 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.035940 kubelet[2050]: W0513 00:29:59.035917 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.036031 kubelet[2050]: E0513 00:29:59.036019 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.036262 kubelet[2050]: E0513 00:29:59.036251 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.036373 kubelet[2050]: W0513 00:29:59.036351 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.036444 kubelet[2050]: E0513 00:29:59.036432 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.036649 kubelet[2050]: E0513 00:29:59.036639 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.036730 kubelet[2050]: W0513 00:29:59.036717 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.036789 kubelet[2050]: E0513 00:29:59.036778 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.037005 kubelet[2050]: E0513 00:29:59.036994 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.037117 kubelet[2050]: W0513 00:29:59.037093 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.037183 kubelet[2050]: E0513 00:29:59.037171 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.037408 kubelet[2050]: E0513 00:29:59.037397 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.037487 kubelet[2050]: W0513 00:29:59.037474 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.037601 kubelet[2050]: E0513 00:29:59.037588 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.037816 kubelet[2050]: E0513 00:29:59.037805 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.037897 kubelet[2050]: W0513 00:29:59.037883 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.037958 kubelet[2050]: E0513 00:29:59.037947 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.038204 kubelet[2050]: E0513 00:29:59.038193 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.038281 kubelet[2050]: W0513 00:29:59.038268 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.038356 kubelet[2050]: E0513 00:29:59.038343 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.038582 kubelet[2050]: E0513 00:29:59.038570 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.038654 kubelet[2050]: W0513 00:29:59.038642 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.038730 kubelet[2050]: E0513 00:29:59.038718 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.043041 kubelet[2050]: E0513 00:29:59.043021 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.043155 kubelet[2050]: W0513 00:29:59.043141 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.043218 kubelet[2050]: E0513 00:29:59.043206 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.043614 kubelet[2050]: E0513 00:29:59.043599 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.043699 kubelet[2050]: W0513 00:29:59.043686 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.043795 kubelet[2050]: E0513 00:29:59.043773 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.043977 kubelet[2050]: E0513 00:29:59.043958 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.044032 kubelet[2050]: W0513 00:29:59.043977 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.044032 kubelet[2050]: E0513 00:29:59.043997 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044176 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.044640 kubelet[2050]: W0513 00:29:59.044189 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044199 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044334 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.044640 kubelet[2050]: W0513 00:29:59.044351 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044399 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044570 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.044640 kubelet[2050]: W0513 00:29:59.044578 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.044640 kubelet[2050]: E0513 00:29:59.044586 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.045464 kubelet[2050]: E0513 00:29:59.045065 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045464 kubelet[2050]: W0513 00:29:59.045078 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.045464 kubelet[2050]: E0513 00:29:59.045270 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045464 kubelet[2050]: W0513 00:29:59.045280 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.045464 kubelet[2050]: E0513 00:29:59.045458 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045464 kubelet[2050]: W0513 00:29:59.045467 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.045757 kubelet[2050]: E0513 00:29:59.045488 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.045757 kubelet[2050]: E0513 00:29:59.045650 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045757 kubelet[2050]: W0513 00:29:59.045658 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.045757 kubelet[2050]: E0513 00:29:59.045671 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.045886 kubelet[2050]: E0513 00:29:59.045802 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045886 kubelet[2050]: W0513 00:29:59.045810 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.045886 kubelet[2050]: E0513 00:29:59.045819 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.045975 kubelet[2050]: E0513 00:29:59.045963 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.045975 kubelet[2050]: W0513 00:29:59.045971 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.046041 kubelet[2050]: E0513 00:29:59.045978 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046150 kubelet[2050]: E0513 00:29:59.046118 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046272 kubelet[2050]: E0513 00:29:59.046258 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.046272 kubelet[2050]: W0513 00:29:59.046270 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.046377 kubelet[2050]: E0513 00:29:59.046279 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046377 kubelet[2050]: E0513 00:29:59.046209 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046523 kubelet[2050]: E0513 00:29:59.046493 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.046570 kubelet[2050]: W0513 00:29:59.046525 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.046570 kubelet[2050]: E0513 00:29:59.046547 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046709 kubelet[2050]: E0513 00:29:59.046693 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.046709 kubelet[2050]: W0513 00:29:59.046700 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.046709 kubelet[2050]: E0513 00:29:59.046708 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.046841 kubelet[2050]: E0513 00:29:59.046817 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.046841 kubelet[2050]: W0513 00:29:59.046829 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.046841 kubelet[2050]: E0513 00:29:59.046837 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.047049 kubelet[2050]: E0513 00:29:59.047038 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.047049 kubelet[2050]: W0513 00:29:59.047049 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.047106 kubelet[2050]: E0513 00:29:59.047057 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.047423 kubelet[2050]: E0513 00:29:59.047409 2050 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:29:59.047423 kubelet[2050]: W0513 00:29:59.047422 2050 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:29:59.047540 kubelet[2050]: E0513 00:29:59.047431 2050 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:29:59.088381 env[1213]: time="2025-05-13T00:29:59.088325368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:59.090207 env[1213]: time="2025-05-13T00:29:59.090172798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:59.092214 env[1213]: time="2025-05-13T00:29:59.092176457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:59.094004 env[1213]: time="2025-05-13T00:29:59.093972571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:29:59.094607 env[1213]: time="2025-05-13T00:29:59.094575728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 13 00:29:59.097171 env[1213]: time="2025-05-13T00:29:59.097135828Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:29:59.108832 env[1213]: time="2025-05-13T00:29:59.108782048Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69\"" May 13 00:29:59.109607 env[1213]: time="2025-05-13T00:29:59.109278573Z" level=info msg="StartContainer for \"39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69\"" May 13 00:29:59.129415 systemd[1]: Started cri-containerd-39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69.scope. May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2495 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:59.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643935373830353230613038333137343238613561616537653333 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit: BPF prog-id=127 op=LOAD May 13 00:29:59.172000 audit[2643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2495 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:59.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643935373830353230613038333137343238613561616537653333 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit: BPF prog-id=128 op=LOAD May 13 00:29:59.172000 audit[2643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2495 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:59.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643935373830353230613038333137343238613561616537653333 May 13 00:29:59.172000 audit: BPF prog-id=128 op=UNLOAD May 13 00:29:59.172000 audit: BPF prog-id=127 op=UNLOAD May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:29:59.172000 audit: BPF prog-id=129 op=LOAD May 13 00:29:59.172000 audit[2643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2495 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:29:59.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643935373830353230613038333137343238613561616537653333 May 13 00:29:59.191616 env[1213]: time="2025-05-13T00:29:59.189785746Z" level=info msg="StartContainer for \"39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69\" returns successfully" May 13 00:29:59.234831 systemd[1]: cri-containerd-39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69.scope: Deactivated successfully. May 13 00:29:59.242000 audit: BPF prog-id=129 op=UNLOAD May 13 00:29:59.285339 env[1213]: time="2025-05-13T00:29:59.285286503Z" level=info msg="shim disconnected" id=39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69 May 13 00:29:59.285598 env[1213]: time="2025-05-13T00:29:59.285578163Z" level=warning msg="cleaning up after shim disconnected" id=39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69 namespace=k8s.io May 13 00:29:59.285667 env[1213]: time="2025-05-13T00:29:59.285655037Z" level=info msg="cleaning up dead shim" May 13 00:29:59.295358 env[1213]: time="2025-05-13T00:29:59.295315837Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:29:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2682 runtime=io.containerd.runc.v2\n" May 13 00:29:59.318197 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-39d95780520a08317428a5aae7e333a425510c3b45d1bfaf362177fa7dc95b69-rootfs.mount: Deactivated successfully. May 13 00:29:59.881324 kubelet[2050]: E0513 00:29:59.881274 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:29:59.938558 kubelet[2050]: E0513 00:29:59.938498 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:59.938920 kubelet[2050]: E0513 00:29:59.938711 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:29:59.939207 env[1213]: time="2025-05-13T00:29:59.939154115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:30:00.940773 kubelet[2050]: E0513 00:30:00.940739 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:01.451756 systemd[1]: Started sshd@7-10.0.0.75:22-10.0.0.1:43966.service. May 13 00:30:01.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.75:22-10.0.0.1:43966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:01.453894 kernel: kauditd_printk_skb: 235 callbacks suppressed May 13 00:30:01.453963 kernel: audit: type=1130 audit(1747096201.451:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.75:22-10.0.0.1:43966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:01.505000 audit[2701]: USER_ACCT pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.506606 sshd[2701]: Accepted publickey for core from 10.0.0.1 port 43966 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:01.508958 sshd[2701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:01.507000 audit[2701]: CRED_ACQ pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.514739 kernel: audit: type=1101 audit(1747096201.505:996): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.514845 kernel: audit: type=1103 audit(1747096201.507:997): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.517019 kernel: audit: type=1006 audit(1747096201.507:998): pid=2701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 13 00:30:01.507000 audit[2701]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda86ca60 a2=3 a3=1 items=0 ppid=1 pid=2701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:01.517081 systemd-logind[1200]: New session 8 of user core. May 13 00:30:01.517585 systemd[1]: Started session-8.scope. May 13 00:30:01.520359 kernel: audit: type=1300 audit(1747096201.507:998): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda86ca60 a2=3 a3=1 items=0 ppid=1 pid=2701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:01.520438 kernel: audit: type=1327 audit(1747096201.507:998): proctitle=737368643A20636F7265205B707269765D May 13 00:30:01.507000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:01.521000 audit[2701]: USER_START pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.525217 kernel: audit: type=1105 audit(1747096201.521:999): pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.525000 audit[2703]: CRED_ACQ pid=2703 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.529548 kernel: audit: type=1103 audit(1747096201.525:1000): pid=2703 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.639376 sshd[2701]: pam_unix(sshd:session): session closed for user core May 13 00:30:01.639000 audit[2701]: USER_END pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.643830 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:30:01.644422 systemd-logind[1200]: Session 8 logged out. Waiting for processes to exit. May 13 00:30:01.644545 systemd[1]: sshd@7-10.0.0.75:22-10.0.0.1:43966.service: Deactivated successfully. May 13 00:30:01.639000 audit[2701]: CRED_DISP pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.646521 systemd-logind[1200]: Removed session 8. May 13 00:30:01.651449 kernel: audit: type=1106 audit(1747096201.639:1001): pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.651534 kernel: audit: type=1104 audit(1747096201.639:1002): pid=2701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:01.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.75:22-10.0.0.1:43966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:01.881016 kubelet[2050]: E0513 00:30:01.880964 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:30:03.452849 env[1213]: time="2025-05-13T00:30:03.452797289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:03.453983 env[1213]: time="2025-05-13T00:30:03.453951747Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:03.455309 env[1213]: time="2025-05-13T00:30:03.455277795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:03.456360 env[1213]: time="2025-05-13T00:30:03.456332537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:03.457059 env[1213]: time="2025-05-13T00:30:03.457027459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 13 00:30:03.459734 env[1213]: time="2025-05-13T00:30:03.459489286Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:30:03.470635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4117128515.mount: Deactivated successfully. May 13 00:30:03.472981 env[1213]: time="2025-05-13T00:30:03.472943554Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e\"" May 13 00:30:03.474757 env[1213]: time="2025-05-13T00:30:03.473499764Z" level=info msg="StartContainer for \"8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e\"" May 13 00:30:03.496830 systemd[1]: Started cri-containerd-8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e.scope. May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2495 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626230353130316439633762313232363362336564366666316239 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit: BPF prog-id=130 op=LOAD May 13 00:30:03.533000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2495 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626230353130316439633762313232363362336564366666316239 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit: BPF prog-id=131 op=LOAD May 13 00:30:03.533000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2495 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626230353130316439633762313232363362336564366666316239 May 13 00:30:03.533000 audit: BPF prog-id=131 op=UNLOAD May 13 00:30:03.533000 audit: BPF prog-id=130 op=UNLOAD May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:03.533000 audit: BPF prog-id=132 op=LOAD May 13 00:30:03.533000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2495 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626230353130316439633762313232363362336564366666316239 May 13 00:30:03.548113 env[1213]: time="2025-05-13T00:30:03.546655026Z" level=info msg="StartContainer for \"8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e\" returns successfully" May 13 00:30:03.880954 kubelet[2050]: E0513 00:30:03.880882 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:30:03.950028 kubelet[2050]: E0513 00:30:03.949624 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:04.154339 env[1213]: time="2025-05-13T00:30:04.154239666Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:30:04.160077 systemd[1]: cri-containerd-8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e.scope: Deactivated successfully. May 13 00:30:04.165000 audit: BPF prog-id=132 op=UNLOAD May 13 00:30:04.185119 env[1213]: time="2025-05-13T00:30:04.185058175Z" level=info msg="shim disconnected" id=8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e May 13 00:30:04.185119 env[1213]: time="2025-05-13T00:30:04.185108372Z" level=warning msg="cleaning up after shim disconnected" id=8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e namespace=k8s.io May 13 00:30:04.185119 env[1213]: time="2025-05-13T00:30:04.185117692Z" level=info msg="cleaning up dead shim" May 13 00:30:04.192549 env[1213]: time="2025-05-13T00:30:04.192502196Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:30:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2767 runtime=io.containerd.runc.v2\n" May 13 00:30:04.222347 kubelet[2050]: I0513 00:30:04.222319 2050 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 13 00:30:04.252945 kubelet[2050]: I0513 00:30:04.252900 2050 topology_manager.go:215] "Topology Admit Handler" podUID="df527755-957c-41fc-9212-bd1ca7c2eb08" podNamespace="kube-system" podName="coredns-7db6d8ff4d-qmrsd" May 13 00:30:04.258338 systemd[1]: Created slice kubepods-burstable-poddf527755_957c_41fc_9212_bd1ca7c2eb08.slice. May 13 00:30:04.259872 kubelet[2050]: I0513 00:30:04.259652 2050 topology_manager.go:215] "Topology Admit Handler" podUID="3f81aff2-a800-419b-b27a-0164800c9964" podNamespace="calico-system" podName="calico-kube-controllers-7c5d49cfff-stkqm" May 13 00:30:04.261647 kubelet[2050]: I0513 00:30:04.261613 2050 topology_manager.go:215] "Topology Admit Handler" podUID="e1d03b2d-00e3-4cc8-b34f-0a7d72b89974" podNamespace="calico-apiserver" podName="calico-apiserver-5f97d46c48-zj7g5" May 13 00:30:04.262823 kubelet[2050]: I0513 00:30:04.262286 2050 topology_manager.go:215] "Topology Admit Handler" podUID="808b1078-7671-444d-9ef9-9601e2f5d633" podNamespace="kube-system" podName="coredns-7db6d8ff4d-2n4wr" May 13 00:30:04.262823 kubelet[2050]: I0513 00:30:04.262465 2050 topology_manager.go:215] "Topology Admit Handler" podUID="51da0a36-b2ef-4a0f-8dc9-79c48712ed6b" podNamespace="calico-apiserver" podName="calico-apiserver-5f97d46c48-sd47w" May 13 00:30:04.266259 systemd[1]: Created slice kubepods-besteffort-pod3f81aff2_a800_419b_b27a_0164800c9964.slice. May 13 00:30:04.274210 systemd[1]: Created slice kubepods-besteffort-pode1d03b2d_00e3_4cc8_b34f_0a7d72b89974.slice. May 13 00:30:04.278562 systemd[1]: Created slice kubepods-burstable-pod808b1078_7671_444d_9ef9_9601e2f5d633.slice. May 13 00:30:04.283610 systemd[1]: Created slice kubepods-besteffort-pod51da0a36_b2ef_4a0f_8dc9_79c48712ed6b.slice. May 13 00:30:04.398377 kubelet[2050]: I0513 00:30:04.398335 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e1d03b2d-00e3-4cc8-b34f-0a7d72b89974-calico-apiserver-certs\") pod \"calico-apiserver-5f97d46c48-zj7g5\" (UID: \"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974\") " pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" May 13 00:30:04.398377 kubelet[2050]: I0513 00:30:04.398384 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6bcks\" (UniqueName: \"kubernetes.io/projected/df527755-957c-41fc-9212-bd1ca7c2eb08-kube-api-access-6bcks\") pod \"coredns-7db6d8ff4d-qmrsd\" (UID: \"df527755-957c-41fc-9212-bd1ca7c2eb08\") " pod="kube-system/coredns-7db6d8ff4d-qmrsd" May 13 00:30:04.398587 kubelet[2050]: I0513 00:30:04.398408 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f81aff2-a800-419b-b27a-0164800c9964-tigera-ca-bundle\") pod \"calico-kube-controllers-7c5d49cfff-stkqm\" (UID: \"3f81aff2-a800-419b-b27a-0164800c9964\") " pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" May 13 00:30:04.398587 kubelet[2050]: I0513 00:30:04.398426 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/808b1078-7671-444d-9ef9-9601e2f5d633-config-volume\") pod \"coredns-7db6d8ff4d-2n4wr\" (UID: \"808b1078-7671-444d-9ef9-9601e2f5d633\") " pod="kube-system/coredns-7db6d8ff4d-2n4wr" May 13 00:30:04.398587 kubelet[2050]: I0513 00:30:04.398445 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kvhtl\" (UniqueName: \"kubernetes.io/projected/e1d03b2d-00e3-4cc8-b34f-0a7d72b89974-kube-api-access-kvhtl\") pod \"calico-apiserver-5f97d46c48-zj7g5\" (UID: \"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974\") " pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" May 13 00:30:04.398587 kubelet[2050]: I0513 00:30:04.398463 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvxrl\" (UniqueName: \"kubernetes.io/projected/51da0a36-b2ef-4a0f-8dc9-79c48712ed6b-kube-api-access-cvxrl\") pod \"calico-apiserver-5f97d46c48-sd47w\" (UID: \"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b\") " pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" May 13 00:30:04.398587 kubelet[2050]: I0513 00:30:04.398483 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hq25w\" (UniqueName: \"kubernetes.io/projected/3f81aff2-a800-419b-b27a-0164800c9964-kube-api-access-hq25w\") pod \"calico-kube-controllers-7c5d49cfff-stkqm\" (UID: \"3f81aff2-a800-419b-b27a-0164800c9964\") " pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" May 13 00:30:04.398712 kubelet[2050]: I0513 00:30:04.398499 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/51da0a36-b2ef-4a0f-8dc9-79c48712ed6b-calico-apiserver-certs\") pod \"calico-apiserver-5f97d46c48-sd47w\" (UID: \"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b\") " pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" May 13 00:30:04.398712 kubelet[2050]: I0513 00:30:04.398538 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/df527755-957c-41fc-9212-bd1ca7c2eb08-config-volume\") pod \"coredns-7db6d8ff4d-qmrsd\" (UID: \"df527755-957c-41fc-9212-bd1ca7c2eb08\") " pod="kube-system/coredns-7db6d8ff4d-qmrsd" May 13 00:30:04.398712 kubelet[2050]: I0513 00:30:04.398557 2050 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-52jtx\" (UniqueName: \"kubernetes.io/projected/808b1078-7671-444d-9ef9-9601e2f5d633-kube-api-access-52jtx\") pod \"coredns-7db6d8ff4d-2n4wr\" (UID: \"808b1078-7671-444d-9ef9-9601e2f5d633\") " pod="kube-system/coredns-7db6d8ff4d-2n4wr" May 13 00:30:04.467793 systemd[1]: run-containerd-runc-k8s.io-8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e-runc.Lfiqx0.mount: Deactivated successfully. May 13 00:30:04.467894 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8dbb05101d9c7b12263b3ed6ff1b91b1ef57dd97353ebe4cea98c2af0a118b1e-rootfs.mount: Deactivated successfully. May 13 00:30:04.561034 kubelet[2050]: E0513 00:30:04.560992 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:04.562386 env[1213]: time="2025-05-13T00:30:04.561833768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qmrsd,Uid:df527755-957c-41fc-9212-bd1ca7c2eb08,Namespace:kube-system,Attempt:0,}" May 13 00:30:04.572568 env[1213]: time="2025-05-13T00:30:04.572503144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5d49cfff-stkqm,Uid:3f81aff2-a800-419b-b27a-0164800c9964,Namespace:calico-system,Attempt:0,}" May 13 00:30:04.577029 env[1213]: time="2025-05-13T00:30:04.576993515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-zj7g5,Uid:e1d03b2d-00e3-4cc8-b34f-0a7d72b89974,Namespace:calico-apiserver,Attempt:0,}" May 13 00:30:04.582296 kubelet[2050]: E0513 00:30:04.582256 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:04.583001 env[1213]: time="2025-05-13T00:30:04.582823178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2n4wr,Uid:808b1078-7671-444d-9ef9-9601e2f5d633,Namespace:kube-system,Attempt:0,}" May 13 00:30:04.588546 env[1213]: time="2025-05-13T00:30:04.588333497Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-sd47w,Uid:51da0a36-b2ef-4a0f-8dc9-79c48712ed6b,Namespace:calico-apiserver,Attempt:0,}" May 13 00:30:04.805838 env[1213]: time="2025-05-13T00:30:04.805663058Z" level=error msg="Failed to destroy network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.806400 env[1213]: time="2025-05-13T00:30:04.806359062Z" level=error msg="encountered an error cleaning up failed sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.806530 env[1213]: time="2025-05-13T00:30:04.806375221Z" level=error msg="Failed to destroy network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.806632 env[1213]: time="2025-05-13T00:30:04.806593210Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qmrsd,Uid:df527755-957c-41fc-9212-bd1ca7c2eb08,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.808036 env[1213]: time="2025-05-13T00:30:04.806808839Z" level=error msg="encountered an error cleaning up failed sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.808036 env[1213]: time="2025-05-13T00:30:04.806996950Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-zj7g5,Uid:e1d03b2d-00e3-4cc8-b34f-0a7d72b89974,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.808212 kubelet[2050]: E0513 00:30:04.807016 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.808212 kubelet[2050]: E0513 00:30:04.807085 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-qmrsd" May 13 00:30:04.808212 kubelet[2050]: E0513 00:30:04.807105 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-qmrsd" May 13 00:30:04.808212 kubelet[2050]: E0513 00:30:04.807135 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.808351 kubelet[2050]: E0513 00:30:04.807179 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" May 13 00:30:04.808351 kubelet[2050]: E0513 00:30:04.807196 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" May 13 00:30:04.808351 kubelet[2050]: E0513 00:30:04.807228 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f97d46c48-zj7g5_calico-apiserver(e1d03b2d-00e3-4cc8-b34f-0a7d72b89974)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f97d46c48-zj7g5_calico-apiserver(e1d03b2d-00e3-4cc8-b34f-0a7d72b89974)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" podUID="e1d03b2d-00e3-4cc8-b34f-0a7d72b89974" May 13 00:30:04.808443 kubelet[2050]: E0513 00:30:04.807141 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-qmrsd_kube-system(df527755-957c-41fc-9212-bd1ca7c2eb08)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-qmrsd_kube-system(df527755-957c-41fc-9212-bd1ca7c2eb08)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-qmrsd" podUID="df527755-957c-41fc-9212-bd1ca7c2eb08" May 13 00:30:04.813542 env[1213]: time="2025-05-13T00:30:04.813458660Z" level=error msg="Failed to destroy network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.813928 env[1213]: time="2025-05-13T00:30:04.813884558Z" level=error msg="encountered an error cleaning up failed sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.813985 env[1213]: time="2025-05-13T00:30:04.813945075Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-sd47w,Uid:51da0a36-b2ef-4a0f-8dc9-79c48712ed6b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.814309 kubelet[2050]: E0513 00:30:04.814165 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.814309 kubelet[2050]: E0513 00:30:04.814218 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" May 13 00:30:04.814309 kubelet[2050]: E0513 00:30:04.814236 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" May 13 00:30:04.814454 kubelet[2050]: E0513 00:30:04.814269 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f97d46c48-sd47w_calico-apiserver(51da0a36-b2ef-4a0f-8dc9-79c48712ed6b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f97d46c48-sd47w_calico-apiserver(51da0a36-b2ef-4a0f-8dc9-79c48712ed6b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" podUID="51da0a36-b2ef-4a0f-8dc9-79c48712ed6b" May 13 00:30:04.819708 env[1213]: time="2025-05-13T00:30:04.819660064Z" level=error msg="Failed to destroy network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.820031 env[1213]: time="2025-05-13T00:30:04.820002767Z" level=error msg="encountered an error cleaning up failed sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.820087 env[1213]: time="2025-05-13T00:30:04.820051804Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2n4wr,Uid:808b1078-7671-444d-9ef9-9601e2f5d633,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.820465 kubelet[2050]: E0513 00:30:04.820188 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.820465 kubelet[2050]: E0513 00:30:04.820243 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2n4wr" May 13 00:30:04.820465 kubelet[2050]: E0513 00:30:04.820261 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2n4wr" May 13 00:30:04.820620 kubelet[2050]: E0513 00:30:04.820302 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-2n4wr_kube-system(808b1078-7671-444d-9ef9-9601e2f5d633)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-2n4wr_kube-system(808b1078-7671-444d-9ef9-9601e2f5d633)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2n4wr" podUID="808b1078-7671-444d-9ef9-9601e2f5d633" May 13 00:30:04.826948 env[1213]: time="2025-05-13T00:30:04.826889736Z" level=error msg="Failed to destroy network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.827255 env[1213]: time="2025-05-13T00:30:04.827214839Z" level=error msg="encountered an error cleaning up failed sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.827295 env[1213]: time="2025-05-13T00:30:04.827265396Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5d49cfff-stkqm,Uid:3f81aff2-a800-419b-b27a-0164800c9964,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.827773 kubelet[2050]: E0513 00:30:04.827457 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.827773 kubelet[2050]: E0513 00:30:04.827515 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" May 13 00:30:04.827773 kubelet[2050]: E0513 00:30:04.827533 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" May 13 00:30:04.827968 kubelet[2050]: E0513 00:30:04.827573 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7c5d49cfff-stkqm_calico-system(3f81aff2-a800-419b-b27a-0164800c9964)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7c5d49cfff-stkqm_calico-system(3f81aff2-a800-419b-b27a-0164800c9964)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" podUID="3f81aff2-a800-419b-b27a-0164800c9964" May 13 00:30:04.952219 kubelet[2050]: I0513 00:30:04.952182 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:04.952865 env[1213]: time="2025-05-13T00:30:04.952833475Z" level=info msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" May 13 00:30:04.956444 kubelet[2050]: I0513 00:30:04.955829 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:04.956723 env[1213]: time="2025-05-13T00:30:04.956694158Z" level=info msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" May 13 00:30:04.957555 kubelet[2050]: I0513 00:30:04.957530 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:04.958072 env[1213]: time="2025-05-13T00:30:04.958033530Z" level=info msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" May 13 00:30:04.961204 kubelet[2050]: E0513 00:30:04.961174 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:04.971772 env[1213]: time="2025-05-13T00:30:04.966580454Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:30:04.971772 env[1213]: time="2025-05-13T00:30:04.968728905Z" level=info msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" May 13 00:30:04.971772 env[1213]: time="2025-05-13T00:30:04.969874486Z" level=info msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" May 13 00:30:04.971995 kubelet[2050]: I0513 00:30:04.967638 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:04.971995 kubelet[2050]: I0513 00:30:04.969259 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:04.997556 env[1213]: time="2025-05-13T00:30:04.997471680Z" level=error msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" failed" error="failed to destroy network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:04.997861 kubelet[2050]: E0513 00:30:04.997811 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:04.997940 kubelet[2050]: E0513 00:30:04.997878 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf"} May 13 00:30:04.997983 kubelet[2050]: E0513 00:30:04.997944 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:04.997983 kubelet[2050]: E0513 00:30:04.997966 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" podUID="51da0a36-b2ef-4a0f-8dc9-79c48712ed6b" May 13 00:30:05.000000 env[1213]: time="2025-05-13T00:30:04.999947873Z" level=error msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" failed" error="failed to destroy network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.000156 kubelet[2050]: E0513 00:30:05.000125 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:05.000205 kubelet[2050]: E0513 00:30:05.000165 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555"} May 13 00:30:05.000205 kubelet[2050]: E0513 00:30:05.000192 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:05.000278 kubelet[2050]: E0513 00:30:05.000214 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" podUID="e1d03b2d-00e3-4cc8-b34f-0a7d72b89974" May 13 00:30:05.009082 env[1213]: time="2025-05-13T00:30:05.009032074Z" level=error msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" failed" error="failed to destroy network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.009404 kubelet[2050]: E0513 00:30:05.009369 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:05.009466 kubelet[2050]: E0513 00:30:05.009414 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82"} May 13 00:30:05.009466 kubelet[2050]: E0513 00:30:05.009442 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"808b1078-7671-444d-9ef9-9601e2f5d633\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:05.009582 kubelet[2050]: E0513 00:30:05.009466 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"808b1078-7671-444d-9ef9-9601e2f5d633\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2n4wr" podUID="808b1078-7671-444d-9ef9-9601e2f5d633" May 13 00:30:05.016405 env[1213]: time="2025-05-13T00:30:05.016332005Z" level=error msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" failed" error="failed to destroy network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.016648 kubelet[2050]: E0513 00:30:05.016599 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:05.016708 kubelet[2050]: E0513 00:30:05.016654 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720"} May 13 00:30:05.016708 kubelet[2050]: E0513 00:30:05.016688 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"df527755-957c-41fc-9212-bd1ca7c2eb08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:05.016784 kubelet[2050]: E0513 00:30:05.016709 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"df527755-957c-41fc-9212-bd1ca7c2eb08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-qmrsd" podUID="df527755-957c-41fc-9212-bd1ca7c2eb08" May 13 00:30:05.021335 env[1213]: time="2025-05-13T00:30:05.021273489Z" level=error msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" failed" error="failed to destroy network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.021537 kubelet[2050]: E0513 00:30:05.021478 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:05.021589 kubelet[2050]: E0513 00:30:05.021538 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722"} May 13 00:30:05.021589 kubelet[2050]: E0513 00:30:05.021568 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3f81aff2-a800-419b-b27a-0164800c9964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:05.021661 kubelet[2050]: E0513 00:30:05.021589 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3f81aff2-a800-419b-b27a-0164800c9964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" podUID="3f81aff2-a800-419b-b27a-0164800c9964" May 13 00:30:05.885056 systemd[1]: Created slice kubepods-besteffort-pod3637d5ad_bcd1_4c1a_963d_45c2e6ce1cf0.slice. May 13 00:30:05.887359 env[1213]: time="2025-05-13T00:30:05.887322339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z485v,Uid:3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0,Namespace:calico-system,Attempt:0,}" May 13 00:30:05.945803 env[1213]: time="2025-05-13T00:30:05.945750746Z" level=error msg="Failed to destroy network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.946302 env[1213]: time="2025-05-13T00:30:05.946267122Z" level=error msg="encountered an error cleaning up failed sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.946418 env[1213]: time="2025-05-13T00:30:05.946389116Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z485v,Uid:3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.947625 kubelet[2050]: E0513 00:30:05.946675 2050 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.947625 kubelet[2050]: E0513 00:30:05.946727 2050 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z485v" May 13 00:30:05.947625 kubelet[2050]: E0513 00:30:05.946753 2050 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z485v" May 13 00:30:05.947773 kubelet[2050]: E0513 00:30:05.946790 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-z485v_calico-system(3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-z485v_calico-system(3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:30:05.948125 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c-shm.mount: Deactivated successfully. May 13 00:30:05.971780 kubelet[2050]: I0513 00:30:05.971727 2050 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:05.972690 env[1213]: time="2025-05-13T00:30:05.972656701Z" level=info msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" May 13 00:30:05.999453 env[1213]: time="2025-05-13T00:30:05.999399542Z" level=error msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" failed" error="failed to destroy network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:30:05.999850 kubelet[2050]: E0513 00:30:05.999800 2050 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:05.999925 kubelet[2050]: E0513 00:30:05.999864 2050 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c"} May 13 00:30:05.999925 kubelet[2050]: E0513 00:30:05.999898 2050 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:30:06.000013 kubelet[2050]: E0513 00:30:05.999933 2050 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z485v" podUID="3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0" May 13 00:30:06.646204 systemd[1]: Started sshd@8-10.0.0.75:22-10.0.0.1:44826.service. May 13 00:30:06.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:06.647253 kernel: kauditd_printk_skb: 45 callbacks suppressed May 13 00:30:06.647315 kernel: audit: type=1130 audit(1747096206.644:1011): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:06.683000 audit[3160]: USER_ACCT pid=3160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.685384 sshd[3160]: Accepted publickey for core from 10.0.0.1 port 44826 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:06.686794 sshd[3160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:06.684000 audit[3160]: CRED_ACQ pid=3160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.694480 kernel: audit: type=1101 audit(1747096206.683:1012): pid=3160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.694548 kernel: audit: type=1103 audit(1747096206.684:1013): pid=3160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.694575 kernel: audit: type=1006 audit(1747096206.684:1014): pid=3160 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 13 00:30:06.696516 systemd-logind[1200]: New session 9 of user core. May 13 00:30:06.696816 kernel: audit: type=1300 audit(1747096206.684:1014): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea9e6ac0 a2=3 a3=1 items=0 ppid=1 pid=3160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:06.684000 audit[3160]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea9e6ac0 a2=3 a3=1 items=0 ppid=1 pid=3160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:06.698110 systemd[1]: Started session-9.scope. May 13 00:30:06.684000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:06.702099 kernel: audit: type=1327 audit(1747096206.684:1014): proctitle=737368643A20636F7265205B707269765D May 13 00:30:06.701000 audit[3160]: USER_START pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.703000 audit[3162]: CRED_ACQ pid=3162 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.711678 kernel: audit: type=1105 audit(1747096206.701:1015): pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.711743 kernel: audit: type=1103 audit(1747096206.703:1016): pid=3162 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.869904 sshd[3160]: pam_unix(sshd:session): session closed for user core May 13 00:30:06.870000 audit[3160]: USER_END pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.873076 systemd[1]: sshd@8-10.0.0.75:22-10.0.0.1:44826.service: Deactivated successfully. May 13 00:30:06.876014 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:30:06.870000 audit[3160]: CRED_DISP pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.877091 systemd-logind[1200]: Session 9 logged out. Waiting for processes to exit. May 13 00:30:06.878244 systemd-logind[1200]: Removed session 9. May 13 00:30:06.880143 kernel: audit: type=1106 audit(1747096206.870:1017): pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.880209 kernel: audit: type=1104 audit(1747096206.870:1018): pid=3160 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:06.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:10.079852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2091260754.mount: Deactivated successfully. May 13 00:30:10.373540 env[1213]: time="2025-05-13T00:30:10.373421008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:10.375012 env[1213]: time="2025-05-13T00:30:10.374974271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:10.376351 env[1213]: time="2025-05-13T00:30:10.376325257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:10.377585 env[1213]: time="2025-05-13T00:30:10.377554163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:10.377956 env[1213]: time="2025-05-13T00:30:10.377932439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 13 00:30:10.391263 env[1213]: time="2025-05-13T00:30:10.391192575Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:30:10.404087 env[1213]: time="2025-05-13T00:30:10.404045116Z" level=info msg="CreateContainer within sandbox \"b0f9bbf932c0e2cb0b434858b42e48c83b53a0042c306674163c851c02571ed8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f\"" May 13 00:30:10.404840 env[1213]: time="2025-05-13T00:30:10.404783108Z" level=info msg="StartContainer for \"290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f\"" May 13 00:30:10.425769 systemd[1]: Started cri-containerd-290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f.scope. May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2495 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:10.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239306439626536356439636133643234383537333564623239643162 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit: BPF prog-id=133 op=LOAD May 13 00:30:10.486000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2495 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:10.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239306439626536356439636133643234383537333564623239643162 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit: BPF prog-id=134 op=LOAD May 13 00:30:10.486000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2495 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:10.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239306439626536356439636133643234383537333564623239643162 May 13 00:30:10.486000 audit: BPF prog-id=134 op=UNLOAD May 13 00:30:10.486000 audit: BPF prog-id=133 op=UNLOAD May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:10.486000 audit: BPF prog-id=135 op=LOAD May 13 00:30:10.486000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2495 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:10.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239306439626536356439636133643234383537333564623239643162 May 13 00:30:10.545622 env[1213]: time="2025-05-13T00:30:10.545555421Z" level=info msg="StartContainer for \"290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f\" returns successfully" May 13 00:30:10.661718 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:30:10.661847 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:30:10.983763 kubelet[2050]: E0513 00:30:10.983692 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:11.000981 kubelet[2050]: I0513 00:30:11.000920 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-x8shn" podStartSLOduration=1.320186095 podStartE2EDuration="15.000903162s" podCreationTimestamp="2025-05-13 00:29:56 +0000 UTC" firstStartedPulling="2025-05-13 00:29:56.698162362 +0000 UTC m=+22.903273334" lastFinishedPulling="2025-05-13 00:30:10.378879429 +0000 UTC m=+36.583990401" observedRunningTime="2025-05-13 00:30:10.998623186 +0000 UTC m=+37.203734158" watchObservedRunningTime="2025-05-13 00:30:11.000903162 +0000 UTC m=+37.206014134" May 13 00:30:11.874151 systemd[1]: Started sshd@9-10.0.0.75:22-10.0.0.1:44834.service. May 13 00:30:11.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:11.875035 kernel: kauditd_printk_skb: 44 callbacks suppressed May 13 00:30:11.875106 kernel: audit: type=1130 audit(1747096211.872:1026): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:11.919000 audit[3312]: AVC avc: denied { write } for pid=3312 comm="tee" name="fd" dev="proc" ino=19118 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.923088 sshd[3265]: Accepted publickey for core from 10.0.0.1 port 44834 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:11.919000 audit[3312]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcdf2aa2a a2=241 a3=1b6 items=1 ppid=3282 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.924907 sshd[3265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:11.928636 kernel: audit: type=1400 audit(1747096211.919:1027): avc: denied { write } for pid=3312 comm="tee" name="fd" dev="proc" ino=19118 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.928713 kernel: audit: type=1300 audit(1747096211.919:1027): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcdf2aa2a a2=241 a3=1b6 items=1 ppid=3282 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.928743 kernel: audit: type=1307 audit(1747096211.919:1027): cwd="/etc/service/enabled/felix/log" May 13 00:30:11.919000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:30:11.919000 audit: PATH item=0 name="/dev/fd/63" inode=19105 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.930674 systemd[1]: Started session-10.scope. May 13 00:30:11.931839 systemd-logind[1200]: New session 10 of user core. May 13 00:30:11.932423 kernel: audit: type=1302 audit(1747096211.919:1027): item=0 name="/dev/fd/63" inode=19105 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.932494 kernel: audit: type=1327 audit(1747096211.919:1027): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.919000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.921000 audit[3265]: USER_ACCT pid=3265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.938386 kernel: audit: type=1101 audit(1747096211.921:1028): pid=3265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.922000 audit[3265]: CRED_ACQ pid=3265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.941662 kernel: audit: type=1103 audit(1747096211.922:1029): pid=3265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.944064 kernel: audit: type=1006 audit(1747096211.922:1030): pid=3265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:30:11.922000 audit[3265]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd59befe0 a2=3 a3=1 items=0 ppid=1 pid=3265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.950357 kernel: audit: type=1300 audit(1747096211.922:1030): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd59befe0 a2=3 a3=1 items=0 ppid=1 pid=3265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:11.927000 audit[3336]: AVC avc: denied { write } for pid=3336 comm="tee" name="fd" dev="proc" ino=17320 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.927000 audit[3336]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd22dea2c a2=241 a3=1b6 items=1 ppid=3275 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.927000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:30:11.927000 audit: PATH item=0 name="/dev/fd/63" inode=19113 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.927000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.931000 audit[3344]: AVC avc: denied { write } for pid=3344 comm="tee" name="fd" dev="proc" ino=17324 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.931000 audit[3344]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd62aa1b a2=241 a3=1b6 items=1 ppid=3285 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.931000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:30:11.931000 audit: PATH item=0 name="/dev/fd/63" inode=17310 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.931000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.934000 audit[3265]: USER_START pid=3265 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.936000 audit[3351]: CRED_ACQ pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:11.936000 audit[3345]: AVC avc: denied { write } for pid=3345 comm="tee" name="fd" dev="proc" ino=19145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.936000 audit[3345]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0790a2a a2=241 a3=1b6 items=1 ppid=3274 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.936000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:30:11.936000 audit: PATH item=0 name="/dev/fd/63" inode=17306 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.940000 audit[3339]: AVC avc: denied { write } for pid=3339 comm="tee" name="fd" dev="proc" ino=19149 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.940000 audit[3339]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd6bca2b a2=241 a3=1b6 items=1 ppid=3279 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.940000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:30:11.940000 audit: PATH item=0 name="/dev/fd/63" inode=18324 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.955000 audit[3354]: AVC avc: denied { write } for pid=3354 comm="tee" name="fd" dev="proc" ino=19803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.955000 audit[3354]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf79fa1a a2=241 a3=1b6 items=1 ppid=3288 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.955000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:30:11.955000 audit: PATH item=0 name="/dev/fd/63" inode=18339 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.962000 audit[3358]: AVC avc: denied { write } for pid=3358 comm="tee" name="fd" dev="proc" ino=17338 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:30:11.962000 audit[3358]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe289a2a a2=241 a3=1b6 items=1 ppid=3297 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:11.962000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:30:11.962000 audit: PATH item=0 name="/dev/fd/63" inode=18342 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:30:11.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:30:11.985391 kubelet[2050]: E0513 00:30:11.985351 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:12.014348 systemd[1]: run-containerd-runc-k8s.io-290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f-runc.rERt02.mount: Deactivated successfully. May 13 00:30:12.133000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.133000 audit: BPF prog-id=136 op=LOAD May 13 00:30:12.133000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcefa6098 a2=98 a3=ffffcefa6088 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.133000 audit: BPF prog-id=136 op=UNLOAD May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.137473 sshd[3265]: pam_unix(sshd:session): session closed for user core May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit: BPF prog-id=137 op=LOAD May 13 00:30:12.136000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcefa5d28 a2=74 a3=95 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.136000 audit: BPF prog-id=137 op=UNLOAD May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.136000 audit: BPF prog-id=138 op=LOAD May 13 00:30:12.136000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcefa5d88 a2=94 a3=2 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.137000 audit: BPF prog-id=138 op=UNLOAD May 13 00:30:12.140000 audit[3265]: USER_END pid=3265 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.140000 audit[3265]: CRED_DISP pid=3265 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.145353 systemd[1]: Started sshd@10-10.0.0.75:22-10.0.0.1:44848.service. May 13 00:30:12.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.75:22-10.0.0.1:44848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:12.147398 systemd[1]: sshd@9-10.0.0.75:22-10.0.0.1:44834.service: Deactivated successfully. May 13 00:30:12.148254 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:30:12.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:12.149915 systemd-logind[1200]: Session 10 logged out. Waiting for processes to exit. May 13 00:30:12.150859 systemd-logind[1200]: Removed session 10. May 13 00:30:12.182000 audit[3430]: USER_ACCT pid=3430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.184435 sshd[3430]: Accepted publickey for core from 10.0.0.1 port 44848 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:12.183000 audit[3430]: CRED_ACQ pid=3430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.183000 audit[3430]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1ecf6e0 a2=3 a3=1 items=0 ppid=1 pid=3430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:12.185776 sshd[3430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:12.190068 systemd[1]: Started session-11.scope. May 13 00:30:12.191652 systemd-logind[1200]: New session 11 of user core. May 13 00:30:12.195000 audit[3430]: USER_START pid=3430 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.196000 audit[3435]: CRED_ACQ pid=3435 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.242000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit: BPF prog-id=139 op=LOAD May 13 00:30:12.242000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcefa5d48 a2=40 a3=ffffcefa5d78 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.242000 audit: BPF prog-id=139 op=UNLOAD May 13 00:30:12.242000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.242000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcefa5e60 a2=50 a3=0 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.251000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.251000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5db8 a2=28 a3=ffffcefa5ee8 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.251000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.251000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.251000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcefa5de8 a2=28 a3=ffffcefa5f18 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.251000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.251000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.251000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcefa5c98 a2=28 a3=ffffcefa5dc8 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.251000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5e08 a2=28 a3=ffffcefa5f38 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5de8 a2=28 a3=ffffcefa5f18 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5dd8 a2=28 a3=ffffcefa5f08 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5e08 a2=28 a3=ffffcefa5f38 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcefa5de8 a2=28 a3=ffffcefa5f18 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcefa5e08 a2=28 a3=ffffcefa5f38 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.252000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.252000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcefa5dd8 a2=28 a3=ffffcefa5f08 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.253000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcefa5e58 a2=28 a3=ffffcefa5f98 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.253000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcefa5b90 a2=50 a3=0 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.253000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.253000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.253000 audit: BPF prog-id=140 op=LOAD May 13 00:30:12.253000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcefa5b98 a2=94 a3=5 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.253000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.253000 audit: BPF prog-id=140 op=UNLOAD May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcefa5ca0 a2=50 a3=0 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.254000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcefa5de8 a2=4 a3=3 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.254000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.254000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.254000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcefa5dc8 a2=94 a3=6 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.255000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcefa5598 a2=94 a3=83 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.255000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.255000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.255000 audit[3427]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcefa5598 a2=94 a3=83 items=0 ppid=3283 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.255000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:30:12.269000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.269000 audit: BPF prog-id=141 op=LOAD May 13 00:30:12.269000 audit[3444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe9716b18 a2=98 a3=ffffe9716b08 items=0 ppid=3283 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.269000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:30:12.269000 audit: BPF prog-id=141 op=UNLOAD May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit: BPF prog-id=142 op=LOAD May 13 00:30:12.270000 audit[3444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe97169c8 a2=74 a3=95 items=0 ppid=3283 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.270000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:30:12.270000 audit: BPF prog-id=142 op=UNLOAD May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { perfmon } for pid=3444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit[3444]: AVC avc: denied { bpf } for pid=3444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.270000 audit: BPF prog-id=143 op=LOAD May 13 00:30:12.270000 audit[3444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe97169f8 a2=40 a3=ffffe9716a28 items=0 ppid=3283 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.270000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:30:12.270000 audit: BPF prog-id=143 op=UNLOAD May 13 00:30:12.327067 systemd-networkd[1036]: vxlan.calico: Link UP May 13 00:30:12.327075 systemd-networkd[1036]: vxlan.calico: Gained carrier May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit: BPF prog-id=144 op=LOAD May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff6754078 a2=98 a3=fffff6754068 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit: BPF prog-id=144 op=UNLOAD May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit: BPF prog-id=145 op=LOAD May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff6753d58 a2=74 a3=95 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit: BPF prog-id=145 op=UNLOAD May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit: BPF prog-id=146 op=LOAD May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff6753db8 a2=94 a3=2 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit: BPF prog-id=146 op=UNLOAD May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753de8 a2=28 a3=fffff6753f18 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6753e18 a2=28 a3=fffff6753f48 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6753cc8 a2=28 a3=fffff6753df8 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753e38 a2=28 a3=fffff6753f68 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753e18 a2=28 a3=fffff6753f48 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753e08 a2=28 a3=fffff6753f38 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753e38 a2=28 a3=fffff6753f68 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6753e18 a2=28 a3=fffff6753f48 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6753e38 a2=28 a3=fffff6753f68 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6753e08 a2=28 a3=fffff6753f38 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff6753e88 a2=28 a3=fffff6753fc8 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.350000 audit: BPF prog-id=147 op=LOAD May 13 00:30:12.350000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff6753ca8 a2=40 a3=fffff6753cd8 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.350000 audit: BPF prog-id=147 op=UNLOAD May 13 00:30:12.351000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.351000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff6753cd0 a2=50 a3=0 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffff6753cd0 a2=50 a3=0 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit: BPF prog-id=148 op=LOAD May 13 00:30:12.353000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff6753438 a2=94 a3=2 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.353000 audit: BPF prog-id=148 op=UNLOAD May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.353000 audit: BPF prog-id=149 op=LOAD May 13 00:30:12.353000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff67535c8 a2=94 a3=30 items=0 ppid=3283 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit: BPF prog-id=150 op=LOAD May 13 00:30:12.361000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdde6e448 a2=98 a3=ffffdde6e438 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.361000 audit: BPF prog-id=150 op=UNLOAD May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit: BPF prog-id=151 op=LOAD May 13 00:30:12.361000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdde6e0d8 a2=74 a3=95 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.361000 audit: BPF prog-id=151 op=UNLOAD May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.361000 audit: BPF prog-id=152 op=LOAD May 13 00:30:12.361000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdde6e138 a2=94 a3=2 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.361000 audit: BPF prog-id=152 op=UNLOAD May 13 00:30:12.382869 sshd[3430]: pam_unix(sshd:session): session closed for user core May 13 00:30:12.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.75:22-10.0.0.1:44860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:12.388670 systemd[1]: Started sshd@11-10.0.0.75:22-10.0.0.1:44860.service. May 13 00:30:12.389000 audit[3430]: USER_END pid=3430 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.391000 audit[3430]: CRED_DISP pid=3430 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.75:22-10.0.0.1:44848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:12.395910 systemd[1]: sshd@10-10.0.0.75:22-10.0.0.1:44848.service: Deactivated successfully. May 13 00:30:12.396738 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:30:12.401652 systemd-logind[1200]: Session 11 logged out. Waiting for processes to exit. May 13 00:30:12.404267 systemd-logind[1200]: Removed session 11. May 13 00:30:12.444000 audit[3484]: USER_ACCT pid=3484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.445853 sshd[3484]: Accepted publickey for core from 10.0.0.1 port 44860 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:12.445000 audit[3484]: CRED_ACQ pid=3484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.445000 audit[3484]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8c50a50 a2=3 a3=1 items=0 ppid=1 pid=3484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:12.447940 sshd[3484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:12.451459 systemd-logind[1200]: New session 12 of user core. May 13 00:30:12.452291 systemd[1]: Started session-12.scope. May 13 00:30:12.454000 audit[3484]: USER_START pid=3484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.455000 audit[3487]: CRED_ACQ pid=3487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.459000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit: BPF prog-id=153 op=LOAD May 13 00:30:12.459000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdde6e0f8 a2=40 a3=ffffdde6e128 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.459000 audit: BPF prog-id=153 op=UNLOAD May 13 00:30:12.459000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.459000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdde6e210 a2=50 a3=0 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e168 a2=28 a3=ffffdde6e298 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdde6e198 a2=28 a3=ffffdde6e2c8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdde6e048 a2=28 a3=ffffdde6e178 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e1b8 a2=28 a3=ffffdde6e2e8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e198 a2=28 a3=ffffdde6e2c8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e188 a2=28 a3=ffffdde6e2b8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e1b8 a2=28 a3=ffffdde6e2e8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdde6e198 a2=28 a3=ffffdde6e2c8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdde6e1b8 a2=28 a3=ffffdde6e2e8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdde6e188 a2=28 a3=ffffdde6e2b8 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdde6e208 a2=28 a3=ffffdde6e348 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdde6df40 a2=50 a3=0 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit: BPF prog-id=154 op=LOAD May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdde6df48 a2=94 a3=5 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit: BPF prog-id=154 op=UNLOAD May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdde6e050 a2=50 a3=0 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdde6e198 a2=4 a3=3 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdde6e178 a2=94 a3=6 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdde6d948 a2=94 a3=83 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.468000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:30:12.468000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdde6d948 a2=94 a3=83 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.469000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.469000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdde6f388 a2=10 a3=ffffdde6f478 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.469000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.469000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdde6f248 a2=10 a3=ffffdde6f338 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.469000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.469000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdde6f1b8 a2=10 a3=ffffdde6f338 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.469000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:12.469000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdde6f1b8 a2=10 a3=ffffdde6f338 items=0 ppid=3283 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:30:12.483000 audit: BPF prog-id=149 op=UNLOAD May 13 00:30:12.527000 audit[3518]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:12.527000 audit[3518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc30aff80 a2=0 a3=ffffaba6ffa8 items=0 ppid=3283 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.527000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:12.534000 audit[3517]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3517 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:12.534000 audit[3517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffeb32b040 a2=0 a3=ffffa18fefa8 items=0 ppid=3283 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.534000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:12.539000 audit[3519]: NETFILTER_CFG table=filter:101 family=2 entries=39 op=nft_register_chain pid=3519 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:12.539000 audit[3519]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffce4072e0 a2=0 a3=ffffb6860fa8 items=0 ppid=3283 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.539000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:12.544000 audit[3516]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3516 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:12.544000 audit[3516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe9a2d9f0 a2=0 a3=ffff89845fa8 items=0 ppid=3283 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:12.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:12.602286 sshd[3484]: pam_unix(sshd:session): session closed for user core May 13 00:30:12.601000 audit[3484]: USER_END pid=3484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.601000 audit[3484]: CRED_DISP pid=3484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:12.604860 systemd-logind[1200]: Session 12 logged out. Waiting for processes to exit. May 13 00:30:12.605022 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:30:12.605891 systemd-logind[1200]: Removed session 12. May 13 00:30:12.606128 systemd[1]: sshd@11-10.0.0.75:22-10.0.0.1:44860.service: Deactivated successfully. May 13 00:30:12.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.75:22-10.0.0.1:44860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:13.773633 systemd-networkd[1036]: vxlan.calico: Gained IPv6LL May 13 00:30:15.881360 env[1213]: time="2025-05-13T00:30:15.881314237Z" level=info msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.967 [INFO][3552] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.973 [INFO][3552] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" iface="eth0" netns="/var/run/netns/cni-3a6bc0d5-9890-1463-ad1f-f7a8fc30219f" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.974 [INFO][3552] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" iface="eth0" netns="/var/run/netns/cni-3a6bc0d5-9890-1463-ad1f-f7a8fc30219f" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.974 [INFO][3552] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" iface="eth0" netns="/var/run/netns/cni-3a6bc0d5-9890-1463-ad1f-f7a8fc30219f" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.974 [INFO][3552] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:15.974 [INFO][3552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.083 [INFO][3560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.083 [INFO][3560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.083 [INFO][3560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.093 [WARNING][3560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.093 [INFO][3560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.097 [INFO][3560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:16.104523 env[1213]: 2025-05-13 00:30:16.099 [INFO][3552] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:16.106541 env[1213]: time="2025-05-13T00:30:16.105628906Z" level=info msg="TearDown network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" successfully" May 13 00:30:16.106541 env[1213]: time="2025-05-13T00:30:16.105666105Z" level=info msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" returns successfully" May 13 00:30:16.108666 systemd[1]: run-netns-cni\x2d3a6bc0d5\x2d9890\x2d1463\x2dad1f\x2df7a8fc30219f.mount: Deactivated successfully. May 13 00:30:16.109516 kubelet[2050]: E0513 00:30:16.109484 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:16.109974 env[1213]: time="2025-05-13T00:30:16.109941826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qmrsd,Uid:df527755-957c-41fc-9212-bd1ca7c2eb08,Namespace:kube-system,Attempt:1,}" May 13 00:30:16.245977 systemd-networkd[1036]: calie530b4b975b: Link UP May 13 00:30:16.254585 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:30:16.254900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie530b4b975b: link becomes ready May 13 00:30:16.255667 systemd-networkd[1036]: calie530b4b975b: Gained carrier May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.159 [INFO][3568] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0 coredns-7db6d8ff4d- kube-system df527755-957c-41fc-9212-bd1ca7c2eb08 881 0 2025-05-13 00:29:49 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-qmrsd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie530b4b975b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.159 [INFO][3568] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.185 [INFO][3583] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" HandleID="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.204 [INFO][3583] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" HandleID="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000304870), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-qmrsd", "timestamp":"2025-05-13 00:30:16.185349453 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.204 [INFO][3583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.204 [INFO][3583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.204 [INFO][3583] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.206 [INFO][3583] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.211 [INFO][3583] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.215 [INFO][3583] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.217 [INFO][3583] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.219 [INFO][3583] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.219 [INFO][3583] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.221 [INFO][3583] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.224 [INFO][3583] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.230 [INFO][3583] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.230 [INFO][3583] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" host="localhost" May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.230 [INFO][3583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:16.274026 env[1213]: 2025-05-13 00:30:16.230 [INFO][3583] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" HandleID="k8s-pod-network.ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.235 [INFO][3568] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"df527755-957c-41fc-9212-bd1ca7c2eb08", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-qmrsd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie530b4b975b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.236 [INFO][3568] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.236 [INFO][3568] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie530b4b975b ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.252 [INFO][3568] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.255 [INFO][3568] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"df527755-957c-41fc-9212-bd1ca7c2eb08", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f", Pod:"coredns-7db6d8ff4d-qmrsd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie530b4b975b", MAC:"f6:83:3b:d3:d8:df", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:16.274632 env[1213]: 2025-05-13 00:30:16.269 [INFO][3568] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qmrsd" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:16.278000 audit[3600]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:16.278000 audit[3600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc5f8d700 a2=0 a3=ffffbd179fa8 items=0 ppid=3283 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:16.287768 env[1213]: time="2025-05-13T00:30:16.287708353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:16.287892 env[1213]: time="2025-05-13T00:30:16.287748072Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:16.287892 env[1213]: time="2025-05-13T00:30:16.287764872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:16.287980 env[1213]: time="2025-05-13T00:30:16.287879071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f pid=3612 runtime=io.containerd.runc.v2 May 13 00:30:16.309212 systemd[1]: Started cri-containerd-ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f.scope. May 13 00:30:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit: BPF prog-id=155 op=LOAD May 13 00:30:16.329000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.329000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3612 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383363363239376430646231613262393039613762316135626235 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3612 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383363363239376430646231613262393039613762316135626235 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.330000 audit: BPF prog-id=156 op=LOAD May 13 00:30:16.330000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3612 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383363363239376430646231613262393039613762316135626235 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit: BPF prog-id=157 op=LOAD May 13 00:30:16.331000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3612 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383363363239376430646231613262393039613762316135626235 May 13 00:30:16.331000 audit: BPF prog-id=157 op=UNLOAD May 13 00:30:16.331000 audit: BPF prog-id=156 op=UNLOAD May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.331000 audit: BPF prog-id=158 op=LOAD May 13 00:30:16.331000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3612 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383363363239376430646231613262393039613762316135626235 May 13 00:30:16.334250 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:16.352128 env[1213]: time="2025-05-13T00:30:16.352090961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qmrsd,Uid:df527755-957c-41fc-9212-bd1ca7c2eb08,Namespace:kube-system,Attempt:1,} returns sandbox id \"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f\"" May 13 00:30:16.353010 kubelet[2050]: E0513 00:30:16.352769 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:16.355298 env[1213]: time="2025-05-13T00:30:16.355268852Z" level=info msg="CreateContainer within sandbox \"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:30:16.366809 env[1213]: time="2025-05-13T00:30:16.366748187Z" level=info msg="CreateContainer within sandbox \"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b39c3ae9e0f85d93330754b1d70a7851d17bb221fe25c65006b5d91e0c03fd19\"" May 13 00:30:16.367411 env[1213]: time="2025-05-13T00:30:16.367383981Z" level=info msg="StartContainer for \"b39c3ae9e0f85d93330754b1d70a7851d17bb221fe25c65006b5d91e0c03fd19\"" May 13 00:30:16.379902 systemd[1]: Started cri-containerd-b39c3ae9e0f85d93330754b1d70a7851d17bb221fe25c65006b5d91e0c03fd19.scope. May 13 00:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit: BPF prog-id=159 op=LOAD May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3612 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396333616539653066383564393333333037353462316437306137 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3612 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396333616539653066383564393333333037353462316437306137 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.399000 audit: BPF prog-id=160 op=LOAD May 13 00:30:16.399000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3612 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396333616539653066383564393333333037353462316437306137 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit: BPF prog-id=161 op=LOAD May 13 00:30:16.400000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3612 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396333616539653066383564393333333037353462316437306137 May 13 00:30:16.400000 audit: BPF prog-id=161 op=UNLOAD May 13 00:30:16.400000 audit: BPF prog-id=160 op=UNLOAD May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:16.400000 audit: BPF prog-id=162 op=LOAD May 13 00:30:16.400000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3612 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:16.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396333616539653066383564393333333037353462316437306137 May 13 00:30:16.413681 env[1213]: time="2025-05-13T00:30:16.413640636Z" level=info msg="StartContainer for \"b39c3ae9e0f85d93330754b1d70a7851d17bb221fe25c65006b5d91e0c03fd19\" returns successfully" May 13 00:30:16.881886 env[1213]: time="2025-05-13T00:30:16.881838134Z" level=info msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" May 13 00:30:16.882531 env[1213]: time="2025-05-13T00:30:16.881886214Z" level=info msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" May 13 00:30:16.882592 env[1213]: time="2025-05-13T00:30:16.881913174Z" level=info msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" iface="eth0" netns="/var/run/netns/cni-8b7f6533-9c1c-8aec-b884-ea0d4f9811d8" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" iface="eth0" netns="/var/run/netns/cni-8b7f6533-9c1c-8aec-b884-ea0d4f9811d8" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" iface="eth0" netns="/var/run/netns/cni-8b7f6533-9c1c-8aec-b884-ea0d4f9811d8" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.936 [INFO][3725] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.969 [INFO][3758] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.969 [INFO][3758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.969 [INFO][3758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.978 [WARNING][3758] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.978 [INFO][3758] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.979 [INFO][3758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:16.983598 env[1213]: 2025-05-13 00:30:16.981 [INFO][3725] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:16.984177 env[1213]: time="2025-05-13T00:30:16.984142915Z" level=info msg="TearDown network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" successfully" May 13 00:30:16.984251 env[1213]: time="2025-05-13T00:30:16.984235354Z" level=info msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" returns successfully" May 13 00:30:16.985582 kubelet[2050]: E0513 00:30:16.985548 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:16.986356 env[1213]: time="2025-05-13T00:30:16.986325574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2n4wr,Uid:808b1078-7671-444d-9ef9-9601e2f5d633,Namespace:kube-system,Attempt:1,}" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.944 [INFO][3740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.944 [INFO][3740] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" iface="eth0" netns="/var/run/netns/cni-ad9d795c-0702-d28e-092a-5f2b0ddd2c87" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.944 [INFO][3740] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" iface="eth0" netns="/var/run/netns/cni-ad9d795c-0702-d28e-092a-5f2b0ddd2c87" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.945 [INFO][3740] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" iface="eth0" netns="/var/run/netns/cni-ad9d795c-0702-d28e-092a-5f2b0ddd2c87" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.945 [INFO][3740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.945 [INFO][3740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.978 [INFO][3765] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.978 [INFO][3765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.979 [INFO][3765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.987 [WARNING][3765] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.987 [INFO][3765] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.989 [INFO][3765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:16.993185 env[1213]: 2025-05-13 00:30:16.991 [INFO][3740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:16.997311 env[1213]: time="2025-05-13T00:30:16.997268674Z" level=info msg="TearDown network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" successfully" May 13 00:30:16.997311 env[1213]: time="2025-05-13T00:30:16.997301754Z" level=info msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" returns successfully" May 13 00:30:16.997823 env[1213]: time="2025-05-13T00:30:16.997793269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5d49cfff-stkqm,Uid:3f81aff2-a800-419b-b27a-0164800c9964,Namespace:calico-system,Attempt:1,}" May 13 00:30:17.001871 kubelet[2050]: E0513 00:30:17.001675 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:17.023654 kubelet[2050]: I0513 00:30:17.023406 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-qmrsd" podStartSLOduration=28.023389639 podStartE2EDuration="28.023389639s" podCreationTimestamp="2025-05-13 00:29:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:30:17.012698495 +0000 UTC m=+43.217809467" watchObservedRunningTime="2025-05-13 00:30:17.023389639 +0000 UTC m=+43.228500611" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.951 [INFO][3746] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.951 [INFO][3746] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" iface="eth0" netns="/var/run/netns/cni-c2226857-0070-f297-3dc7-a700ceee2edf" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.953 [INFO][3746] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" iface="eth0" netns="/var/run/netns/cni-c2226857-0070-f297-3dc7-a700ceee2edf" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.953 [INFO][3746] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" iface="eth0" netns="/var/run/netns/cni-c2226857-0070-f297-3dc7-a700ceee2edf" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.953 [INFO][3746] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.953 [INFO][3746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.978 [INFO][3774] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.979 [INFO][3774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:16.990 [INFO][3774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:17.009 [WARNING][3774] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:17.009 [INFO][3774] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:17.021 [INFO][3774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:17.033366 env[1213]: 2025-05-13 00:30:17.028 [INFO][3746] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:17.034137 env[1213]: time="2025-05-13T00:30:17.034103944Z" level=info msg="TearDown network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" successfully" May 13 00:30:17.034278 env[1213]: time="2025-05-13T00:30:17.034260222Z" level=info msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" returns successfully" May 13 00:30:17.036494 env[1213]: time="2025-05-13T00:30:17.035622490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z485v,Uid:3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0,Namespace:calico-system,Attempt:1,}" May 13 00:30:17.094000 audit[3834]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.096677 kernel: kauditd_printk_skb: 655 callbacks suppressed May 13 00:30:17.096756 kernel: audit: type=1325 audit(1747096217.094:1192): table=filter:104 family=2 entries=16 op=nft_register_rule pid=3834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.094000 audit[3834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc2ff7aa0 a2=0 a3=1 items=0 ppid=2254 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.102234 kernel: audit: type=1300 audit(1747096217.094:1192): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc2ff7aa0 a2=0 a3=1 items=0 ppid=2254 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.102311 kernel: audit: type=1327 audit(1747096217.094:1192): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.104000 audit[3834]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.104000 audit[3834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc2ff7aa0 a2=0 a3=1 items=0 ppid=2254 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.109542 systemd[1]: run-netns-cni\x2dc2226857\x2d0070\x2df297\x2d3dc7\x2da700ceee2edf.mount: Deactivated successfully. May 13 00:30:17.109635 systemd[1]: run-netns-cni\x2d8b7f6533\x2d9c1c\x2d8aec\x2db884\x2dea0d4f9811d8.mount: Deactivated successfully. May 13 00:30:17.109692 systemd[1]: run-netns-cni\x2dad9d795c\x2d0702\x2dd28e\x2d092a\x2d5f2b0ddd2c87.mount: Deactivated successfully. May 13 00:30:17.111240 kernel: audit: type=1325 audit(1747096217.104:1193): table=nat:105 family=2 entries=14 op=nft_register_rule pid=3834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.111301 kernel: audit: type=1300 audit(1747096217.104:1193): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc2ff7aa0 a2=0 a3=1 items=0 ppid=2254 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.111322 kernel: audit: type=1327 audit(1747096217.104:1193): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.123000 audit[3847]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.123000 audit[3847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffc203690 a2=0 a3=1 items=0 ppid=2254 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.131954 kernel: audit: type=1325 audit(1747096217.123:1194): table=filter:106 family=2 entries=13 op=nft_register_rule pid=3847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.132027 kernel: audit: type=1300 audit(1747096217.123:1194): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffc203690 a2=0 a3=1 items=0 ppid=2254 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.132052 kernel: audit: type=1327 audit(1747096217.123:1194): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.137000 audit[3847]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.137000 audit[3847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffc203690 a2=0 a3=1 items=0 ppid=2254 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:17.143038 kernel: audit: type=1325 audit(1747096217.137:1195): table=nat:107 family=2 entries=35 op=nft_register_chain pid=3847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:17.184467 systemd-networkd[1036]: cali5f03eb9ce3b: Link UP May 13 00:30:17.185695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f03eb9ce3b: link becomes ready May 13 00:30:17.185501 systemd-networkd[1036]: cali5f03eb9ce3b: Gained carrier May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.072 [INFO][3791] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0 coredns-7db6d8ff4d- kube-system 808b1078-7671-444d-9ef9-9601e2f5d633 898 0 2025-05-13 00:29:49 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-2n4wr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5f03eb9ce3b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.072 [INFO][3791] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.120 [INFO][3829] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" HandleID="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.144 [INFO][3829] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" HandleID="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400058e390), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-2n4wr", "timestamp":"2025-05-13 00:30:17.120803329 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.144 [INFO][3829] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.144 [INFO][3829] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.144 [INFO][3829] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.145 [INFO][3829] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.150 [INFO][3829] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.156 [INFO][3829] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.160 [INFO][3829] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.162 [INFO][3829] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.163 [INFO][3829] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.164 [INFO][3829] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.172 [INFO][3829] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.178 [INFO][3829] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.178 [INFO][3829] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" host="localhost" May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.178 [INFO][3829] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:17.202964 env[1213]: 2025-05-13 00:30:17.178 [INFO][3829] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" HandleID="k8s-pod-network.da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.182 [INFO][3791] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"808b1078-7671-444d-9ef9-9601e2f5d633", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-2n4wr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f03eb9ce3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.182 [INFO][3791] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.182 [INFO][3791] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5f03eb9ce3b ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.185 [INFO][3791] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.186 [INFO][3791] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"808b1078-7671-444d-9ef9-9601e2f5d633", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e", Pod:"coredns-7db6d8ff4d-2n4wr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f03eb9ce3b", MAC:"7e:51:50:a7:c9:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.203540 env[1213]: 2025-05-13 00:30:17.196 [INFO][3791] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2n4wr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:17.209000 audit[3874]: NETFILTER_CFG table=filter:108 family=2 entries=30 op=nft_register_chain pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:17.209000 audit[3874]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=ffffea0e0020 a2=0 a3=ffffa23bafa8 items=0 ppid=3283 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:17.216486 env[1213]: time="2025-05-13T00:30:17.216414594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:17.216486 env[1213]: time="2025-05-13T00:30:17.216456193Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:17.216680 env[1213]: time="2025-05-13T00:30:17.216641472Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:17.217467 env[1213]: time="2025-05-13T00:30:17.217406985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e pid=3882 runtime=io.containerd.runc.v2 May 13 00:30:17.228217 systemd-networkd[1036]: calicb7b4039b59: Link UP May 13 00:30:17.230095 systemd-networkd[1036]: calicb7b4039b59: Gained carrier May 13 00:30:17.230535 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicb7b4039b59: link becomes ready May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.079 [INFO][3796] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0 calico-kube-controllers-7c5d49cfff- calico-system 3f81aff2-a800-419b-b27a-0164800c9964 899 0 2025-05-13 00:29:56 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7c5d49cfff projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7c5d49cfff-stkqm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicb7b4039b59 [] []}} ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.084 [INFO][3796] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.130 [INFO][3837] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" HandleID="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.144 [INFO][3837] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" HandleID="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000364b00), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7c5d49cfff-stkqm", "timestamp":"2025-05-13 00:30:17.130785319 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.144 [INFO][3837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.178 [INFO][3837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.178 [INFO][3837] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.182 [INFO][3837] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.193 [INFO][3837] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.202 [INFO][3837] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.208 [INFO][3837] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.210 [INFO][3837] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.210 [INFO][3837] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.212 [INFO][3837] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.217 [INFO][3837] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.223 [INFO][3837] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.223 [INFO][3837] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" host="localhost" May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.223 [INFO][3837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:17.250563 env[1213]: 2025-05-13 00:30:17.223 [INFO][3837] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" HandleID="k8s-pod-network.338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.249224 systemd[1]: run-containerd-runc-k8s.io-da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e-runc.bY6oMj.mount: Deactivated successfully. May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.225 [INFO][3796] cni-plugin/k8s.go 386: Populated endpoint ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0", GenerateName:"calico-kube-controllers-7c5d49cfff-", Namespace:"calico-system", SelfLink:"", UID:"3f81aff2-a800-419b-b27a-0164800c9964", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5d49cfff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7c5d49cfff-stkqm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicb7b4039b59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.225 [INFO][3796] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.225 [INFO][3796] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicb7b4039b59 ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.230 [INFO][3796] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.230 [INFO][3796] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0", GenerateName:"calico-kube-controllers-7c5d49cfff-", Namespace:"calico-system", SelfLink:"", UID:"3f81aff2-a800-419b-b27a-0164800c9964", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5d49cfff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b", Pod:"calico-kube-controllers-7c5d49cfff-stkqm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicb7b4039b59", MAC:"d6:34:0b:7f:a0:5f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.251406 env[1213]: 2025-05-13 00:30:17.243 [INFO][3796] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b" Namespace="calico-system" Pod="calico-kube-controllers-7c5d49cfff-stkqm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:17.253745 systemd[1]: Started cri-containerd-da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e.scope. May 13 00:30:17.253000 audit[3910]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:17.253000 audit[3910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=ffffcec0f210 a2=0 a3=ffffacf02fa8 items=0 ppid=3283 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:17.269736 env[1213]: time="2025-05-13T00:30:17.264633363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:17.269736 env[1213]: time="2025-05-13T00:30:17.264675762Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:17.269736 env[1213]: time="2025-05-13T00:30:17.264685162Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:17.269736 env[1213]: time="2025-05-13T00:30:17.269637158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b pid=3925 runtime=io.containerd.runc.v2 May 13 00:30:17.280115 systemd-networkd[1036]: cali73574814dbb: Link UP May 13 00:30:17.282575 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:30:17.282671 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali73574814dbb: link becomes ready May 13 00:30:17.282635 systemd-networkd[1036]: cali73574814dbb: Gained carrier May 13 00:30:17.295902 systemd[1]: Started cri-containerd-338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b.scope. May 13 00:30:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.296000 audit: BPF prog-id=163 op=LOAD May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3882 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323566346338376534633331313737613666346466633738313530 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3882 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323566346338376534633331313737613666346466633738313530 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit: BPF prog-id=164 op=LOAD May 13 00:30:17.297000 audit[3891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3882 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323566346338376534633331313737613666346466633738313530 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit: BPF prog-id=165 op=LOAD May 13 00:30:17.297000 audit[3891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3882 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323566346338376534633331313737613666346466633738313530 May 13 00:30:17.297000 audit: BPF prog-id=165 op=UNLOAD May 13 00:30:17.297000 audit: BPF prog-id=164 op=UNLOAD May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.297000 audit: BPF prog-id=166 op=LOAD May 13 00:30:17.297000 audit[3891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3882 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323566346338376534633331313737613666346466633738313530 May 13 00:30:17.299580 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.122 [INFO][3811] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--z485v-eth0 csi-node-driver- calico-system 3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0 900 0 2025-05-13 00:29:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-z485v eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali73574814dbb [] []}} ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.122 [INFO][3811] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.164 [INFO][3850] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" HandleID="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.182 [INFO][3850] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" HandleID="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Workload="localhost-k8s-csi--node--driver--z485v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400036c850), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-z485v", "timestamp":"2025-05-13 00:30:17.164776135 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.182 [INFO][3850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.223 [INFO][3850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.224 [INFO][3850] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.226 [INFO][3850] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.232 [INFO][3850] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.236 [INFO][3850] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.240 [INFO][3850] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.243 [INFO][3850] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.243 [INFO][3850] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.254 [INFO][3850] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670 May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.261 [INFO][3850] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.271 [INFO][3850] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.271 [INFO][3850] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" host="localhost" May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.271 [INFO][3850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:17.301976 env[1213]: 2025-05-13 00:30:17.271 [INFO][3850] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" HandleID="k8s-pod-network.1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.278 [INFO][3811] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--z485v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-z485v", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali73574814dbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.278 [INFO][3811] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.278 [INFO][3811] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali73574814dbb ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.282 [INFO][3811] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.283 [INFO][3811] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--z485v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670", Pod:"csi-node-driver-z485v", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali73574814dbb", MAC:"32:e8:6d:1d:ba:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:17.302578 env[1213]: 2025-05-13 00:30:17.295 [INFO][3811] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670" Namespace="calico-system" Pod="csi-node-driver-z485v" WorkloadEndpoint="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:17.310000 audit[3966]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=3966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:17.310000 audit[3966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffda1d7600 a2=0 a3=ffff8241bfa8 items=0 ppid=3283 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.310000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:17.326433 env[1213]: time="2025-05-13T00:30:17.326370051Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:17.326632 env[1213]: time="2025-05-13T00:30:17.326590009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:17.326725 env[1213]: time="2025-05-13T00:30:17.326703288Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:17.327036 env[1213]: time="2025-05-13T00:30:17.327005805Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670 pid=3986 runtime=io.containerd.runc.v2 May 13 00:30:17.330041 env[1213]: time="2025-05-13T00:30:17.330006858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2n4wr,Uid:808b1078-7671-444d-9ef9-9601e2f5d633,Namespace:kube-system,Attempt:1,} returns sandbox id \"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e\"" May 13 00:30:17.330855 kubelet[2050]: E0513 00:30:17.330834 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:17.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.330000 audit: BPF prog-id=167 op=LOAD May 13 00:30:17.331000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.331000 audit[3940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3925 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383635386664356630626630313763373233366337313833613632 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3925 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383635386664356630626630313763373233366337313833613632 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit: BPF prog-id=168 op=LOAD May 13 00:30:17.332000 audit[3940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3925 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383635386664356630626630313763373233366337313833613632 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.332000 audit: BPF prog-id=169 op=LOAD May 13 00:30:17.332000 audit[3940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3925 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383635386664356630626630313763373233366337313833613632 May 13 00:30:17.333000 audit: BPF prog-id=169 op=UNLOAD May 13 00:30:17.333000 audit: BPF prog-id=168 op=UNLOAD May 13 00:30:17.333000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.336260 env[1213]: time="2025-05-13T00:30:17.336221883Z" level=info msg="CreateContainer within sandbox \"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:30:17.333000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.333000 audit: BPF prog-id=170 op=LOAD May 13 00:30:17.333000 audit[3940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3925 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383635386664356630626630313763373233366337313833613632 May 13 00:30:17.337653 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:17.340433 systemd[1]: Started cri-containerd-1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670.scope. May 13 00:30:17.355683 env[1213]: time="2025-05-13T00:30:17.355629629Z" level=info msg="CreateContainer within sandbox \"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bbbb2e4ce8c0259f3e6b48dadcf38db7c39d1e1b8341e9d14fc00db64d62716e\"" May 13 00:30:17.359200 env[1213]: time="2025-05-13T00:30:17.359174078Z" level=info msg="StartContainer for \"bbbb2e4ce8c0259f3e6b48dadcf38db7c39d1e1b8341e9d14fc00db64d62716e\"" May 13 00:30:17.376077 env[1213]: time="2025-05-13T00:30:17.376038887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5d49cfff-stkqm,Uid:3f81aff2-a800-419b-b27a-0164800c9964,Namespace:calico-system,Attempt:1,} returns sandbox id \"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b\"" May 13 00:30:17.378345 env[1213]: time="2025-05-13T00:30:17.378029949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:30:17.383679 systemd[1]: Started cri-containerd-bbbb2e4ce8c0259f3e6b48dadcf38db7c39d1e1b8341e9d14fc00db64d62716e.scope. May 13 00:30:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.384000 audit: BPF prog-id=171 op=LOAD May 13 00:30:17.385000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.385000 audit[3996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3986 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323535373161653139376638643865326263396566373061313162 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3986 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323535373161653139376638643865326263396566373061313162 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.386000 audit: BPF prog-id=172 op=LOAD May 13 00:30:17.386000 audit[3996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3986 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323535373161653139376638643865326263396566373061313162 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.387000 audit: BPF prog-id=173 op=LOAD May 13 00:30:17.387000 audit[3996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3986 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323535373161653139376638643865326263396566373061313162 May 13 00:30:17.387000 audit: BPF prog-id=173 op=UNLOAD May 13 00:30:17.388000 audit: BPF prog-id=172 op=UNLOAD May 13 00:30:17.388000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.388000 audit: BPF prog-id=174 op=LOAD May 13 00:30:17.388000 audit[3996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3986 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323535373161653139376638643865326263396566373061313162 May 13 00:30:17.392119 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:17.404432 env[1213]: time="2025-05-13T00:30:17.404393193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z485v,Uid:3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0,Namespace:calico-system,Attempt:1,} returns sandbox id \"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670\"" May 13 00:30:17.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.417000 audit: BPF prog-id=175 op=LOAD May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3882 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262626232653463653863303235396633653662343864616463663338 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3882 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262626232653463653863303235396633653662343864616463663338 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit: BPF prog-id=176 op=LOAD May 13 00:30:17.418000 audit[4027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3882 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262626232653463653863303235396633653662343864616463663338 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit: BPF prog-id=177 op=LOAD May 13 00:30:17.418000 audit[4027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3882 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262626232653463653863303235396633653662343864616463663338 May 13 00:30:17.418000 audit: BPF prog-id=177 op=UNLOAD May 13 00:30:17.418000 audit: BPF prog-id=176 op=UNLOAD May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:17.418000 audit: BPF prog-id=178 op=LOAD May 13 00:30:17.418000 audit[4027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3882 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262626232653463653863303235396633653662343864616463663338 May 13 00:30:17.437705 env[1213]: time="2025-05-13T00:30:17.437595096Z" level=info msg="StartContainer for \"bbbb2e4ce8c0259f3e6b48dadcf38db7c39d1e1b8341e9d14fc00db64d62716e\" returns successfully" May 13 00:30:17.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.75:22-10.0.0.1:45506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:17.606827 systemd[1]: Started sshd@12-10.0.0.75:22-10.0.0.1:45506.service. May 13 00:30:17.644000 audit[4073]: USER_ACCT pid=4073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.646634 sshd[4073]: Accepted publickey for core from 10.0.0.1 port 45506 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:17.646000 audit[4073]: CRED_ACQ pid=4073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.647000 audit[4073]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0ba3ee0 a2=3 a3=1 items=0 ppid=1 pid=4073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:17.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:17.649284 sshd[4073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:17.652671 systemd-logind[1200]: New session 13 of user core. May 13 00:30:17.653487 systemd[1]: Started session-13.scope. May 13 00:30:17.655000 audit[4073]: USER_START pid=4073 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.656000 audit[4075]: CRED_ACQ pid=4075 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.791538 sshd[4073]: pam_unix(sshd:session): session closed for user core May 13 00:30:17.790000 audit[4073]: USER_END pid=4073 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.791000 audit[4073]: CRED_DISP pid=4073 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:17.794021 systemd[1]: sshd@12-10.0.0.75:22-10.0.0.1:45506.service: Deactivated successfully. May 13 00:30:17.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.75:22-10.0.0.1:45506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:17.794760 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:30:17.795232 systemd-logind[1200]: Session 13 logged out. Waiting for processes to exit. May 13 00:30:17.795822 systemd-logind[1200]: Removed session 13. May 13 00:30:17.882541 env[1213]: time="2025-05-13T00:30:17.882473159Z" level=info msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" May 13 00:30:17.933675 systemd-networkd[1036]: calie530b4b975b: Gained IPv6LL May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.921 [INFO][4101] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.921 [INFO][4101] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" iface="eth0" netns="/var/run/netns/cni-36131d99-017e-ffc5-2f65-c2a5b4909584" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.922 [INFO][4101] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" iface="eth0" netns="/var/run/netns/cni-36131d99-017e-ffc5-2f65-c2a5b4909584" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.922 [INFO][4101] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" iface="eth0" netns="/var/run/netns/cni-36131d99-017e-ffc5-2f65-c2a5b4909584" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.922 [INFO][4101] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.922 [INFO][4101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.942 [INFO][4109] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.942 [INFO][4109] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.942 [INFO][4109] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.950 [WARNING][4109] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.951 [INFO][4109] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.952 [INFO][4109] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:17.955449 env[1213]: 2025-05-13 00:30:17.953 [INFO][4101] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:17.955903 env[1213]: time="2025-05-13T00:30:17.955560386Z" level=info msg="TearDown network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" successfully" May 13 00:30:17.955903 env[1213]: time="2025-05-13T00:30:17.955588826Z" level=info msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" returns successfully" May 13 00:30:17.956180 env[1213]: time="2025-05-13T00:30:17.956148461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-zj7g5,Uid:e1d03b2d-00e3-4cc8-b34f-0a7d72b89974,Namespace:calico-apiserver,Attempt:1,}" May 13 00:30:18.004953 kubelet[2050]: E0513 00:30:18.004725 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:18.017286 kubelet[2050]: I0513 00:30:18.014578 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-2n4wr" podStartSLOduration=29.014564342 podStartE2EDuration="29.014564342s" podCreationTimestamp="2025-05-13 00:29:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:30:18.014361703 +0000 UTC m=+44.219472675" watchObservedRunningTime="2025-05-13 00:30:18.014564342 +0000 UTC m=+44.219675314" May 13 00:30:18.017286 kubelet[2050]: E0513 00:30:18.015308 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:18.034000 audit[4140]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:18.034000 audit[4140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe14f80a0 a2=0 a3=1 items=0 ppid=2254 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:18.045000 audit[4140]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:18.045000 audit[4140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe14f80a0 a2=0 a3=1 items=0 ppid=2254 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:18.076817 systemd-networkd[1036]: calic5796a17177: Link UP May 13 00:30:18.078524 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5796a17177: link becomes ready May 13 00:30:18.078527 systemd-networkd[1036]: calic5796a17177: Gained carrier May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:17.992 [INFO][4117] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0 calico-apiserver-5f97d46c48- calico-apiserver e1d03b2d-00e3-4cc8-b34f-0a7d72b89974 930 0 2025-05-13 00:29:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f97d46c48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f97d46c48-zj7g5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic5796a17177 [] []}} ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:17.992 [INFO][4117] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.032 [INFO][4132] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" HandleID="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.045 [INFO][4132] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" HandleID="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000295e30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f97d46c48-zj7g5", "timestamp":"2025-05-13 00:30:18.032404146 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.045 [INFO][4132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.045 [INFO][4132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.045 [INFO][4132] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.049 [INFO][4132] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.053 [INFO][4132] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.056 [INFO][4132] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.058 [INFO][4132] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.061 [INFO][4132] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.061 [INFO][4132] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.062 [INFO][4132] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.067 [INFO][4132] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.072 [INFO][4132] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.072 [INFO][4132] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" host="localhost" May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.072 [INFO][4132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:18.091359 env[1213]: 2025-05-13 00:30:18.072 [INFO][4132] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" HandleID="k8s-pod-network.1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.074 [INFO][4117] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f97d46c48-zj7g5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5796a17177", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.074 [INFO][4117] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.074 [INFO][4117] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic5796a17177 ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.079 [INFO][4117] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.079 [INFO][4117] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf", Pod:"calico-apiserver-5f97d46c48-zj7g5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5796a17177", MAC:"b6:e9:38:f0:9a:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:18.092154 env[1213]: 2025-05-13 00:30:18.088 [INFO][4117] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-zj7g5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:18.099000 audit[4157]: NETFILTER_CFG table=filter:113 family=2 entries=62 op=nft_register_chain pid=4157 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:18.099000 audit[4157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=31096 a0=3 a1=ffffe061cb90 a2=0 a3=ffff85423fa8 items=0 ppid=3283 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.099000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:18.109013 systemd[1]: run-netns-cni\x2d36131d99\x2d017e\x2dffc5\x2d2f65\x2dc2a5b4909584.mount: Deactivated successfully. May 13 00:30:18.114842 env[1213]: time="2025-05-13T00:30:18.114638511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:18.114842 env[1213]: time="2025-05-13T00:30:18.114677031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:18.114842 env[1213]: time="2025-05-13T00:30:18.114687230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:18.115285 env[1213]: time="2025-05-13T00:30:18.114828789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf pid=4165 runtime=io.containerd.runc.v2 May 13 00:30:18.132272 systemd[1]: run-containerd-runc-k8s.io-1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf-runc.UC9tO2.mount: Deactivated successfully. May 13 00:30:18.133874 systemd[1]: Started cri-containerd-1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf.scope. May 13 00:30:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.148000 audit: BPF prog-id=179 op=LOAD May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=4165 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646266666664636638376136616166623437386361303732393465 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=4165 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646266666664636638376136616166623437386361303732393465 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit: BPF prog-id=180 op=LOAD May 13 00:30:18.149000 audit[4176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=4165 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646266666664636638376136616166623437386361303732393465 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit: BPF prog-id=181 op=LOAD May 13 00:30:18.149000 audit[4176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=4165 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646266666664636638376136616166623437386361303732393465 May 13 00:30:18.149000 audit: BPF prog-id=181 op=UNLOAD May 13 00:30:18.149000 audit: BPF prog-id=180 op=UNLOAD May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:18.149000 audit: BPF prog-id=182 op=LOAD May 13 00:30:18.149000 audit[4176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=4165 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:18.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646266666664636638376136616166623437386361303732393465 May 13 00:30:18.151487 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:18.168347 env[1213]: time="2025-05-13T00:30:18.168310044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-zj7g5,Uid:e1d03b2d-00e3-4cc8-b34f-0a7d72b89974,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf\"" May 13 00:30:18.253689 systemd-networkd[1036]: cali5f03eb9ce3b: Gained IPv6LL May 13 00:30:18.637926 systemd-networkd[1036]: cali73574814dbb: Gained IPv6LL May 13 00:30:18.881536 env[1213]: time="2025-05-13T00:30:18.881473039Z" level=info msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.927 [INFO][4217] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.927 [INFO][4217] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" iface="eth0" netns="/var/run/netns/cni-2730a9c7-fc1b-8cf5-bdb5-feb1cb219244" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.928 [INFO][4217] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" iface="eth0" netns="/var/run/netns/cni-2730a9c7-fc1b-8cf5-bdb5-feb1cb219244" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.928 [INFO][4217] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" iface="eth0" netns="/var/run/netns/cni-2730a9c7-fc1b-8cf5-bdb5-feb1cb219244" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.928 [INFO][4217] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.928 [INFO][4217] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.952 [INFO][4226] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.952 [INFO][4226] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.952 [INFO][4226] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.960 [WARNING][4226] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.960 [INFO][4226] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.966 [INFO][4226] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:18.972610 env[1213]: 2025-05-13 00:30:18.970 [INFO][4217] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:18.974650 env[1213]: time="2025-05-13T00:30:18.974603269Z" level=info msg="TearDown network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" successfully" May 13 00:30:18.974739 env[1213]: time="2025-05-13T00:30:18.974648189Z" level=info msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" returns successfully" May 13 00:30:18.974769 systemd[1]: run-netns-cni\x2d2730a9c7\x2dfc1b\x2d8cf5\x2dbdb5\x2dfeb1cb219244.mount: Deactivated successfully. May 13 00:30:18.975618 env[1213]: time="2025-05-13T00:30:18.975579500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-sd47w,Uid:51da0a36-b2ef-4a0f-8dc9-79c48712ed6b,Namespace:calico-apiserver,Attempt:1,}" May 13 00:30:19.018456 kubelet[2050]: E0513 00:30:19.018428 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:19.019019 kubelet[2050]: E0513 00:30:19.018550 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:19.126640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:30:19.126748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e7af833bc1: link becomes ready May 13 00:30:19.128025 systemd-networkd[1036]: cali2e7af833bc1: Link UP May 13 00:30:19.128152 systemd-networkd[1036]: cali2e7af833bc1: Gained carrier May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.044 [INFO][4235] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0 calico-apiserver-5f97d46c48- calico-apiserver 51da0a36-b2ef-4a0f-8dc9-79c48712ed6b 948 0 2025-05-13 00:29:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f97d46c48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f97d46c48-sd47w eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2e7af833bc1 [] []}} ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.044 [INFO][4235] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.073 [INFO][4251] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" HandleID="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.084 [INFO][4251] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" HandleID="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400036bea0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f97d46c48-sd47w", "timestamp":"2025-05-13 00:30:19.073939702 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.084 [INFO][4251] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.084 [INFO][4251] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.084 [INFO][4251] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.086 [INFO][4251] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.091 [INFO][4251] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.095 [INFO][4251] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.097 [INFO][4251] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.099 [INFO][4251] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.099 [INFO][4251] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.101 [INFO][4251] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67 May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.109 [INFO][4251] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.121 [INFO][4251] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.121 [INFO][4251] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" host="localhost" May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.121 [INFO][4251] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:19.143436 env[1213]: 2025-05-13 00:30:19.121 [INFO][4251] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" HandleID="k8s-pod-network.21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.123 [INFO][4235] cni-plugin/k8s.go 386: Populated endpoint ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f97d46c48-sd47w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e7af833bc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.123 [INFO][4235] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.123 [INFO][4235] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2e7af833bc1 ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.126 [INFO][4235] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.128 [INFO][4235] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67", Pod:"calico-apiserver-5f97d46c48-sd47w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e7af833bc1", MAC:"ee:6e:e1:59:7f:1b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:19.144150 env[1213]: 2025-05-13 00:30:19.141 [INFO][4235] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67" Namespace="calico-apiserver" Pod="calico-apiserver-5f97d46c48-sd47w" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:19.149822 systemd-networkd[1036]: calicb7b4039b59: Gained IPv6LL May 13 00:30:19.148000 audit[4268]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:30:19.148000 audit[4268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23876 a0=3 a1=ffffed5492e0 a2=0 a3=ffff9b328fa8 items=0 ppid=3283 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.148000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:30:19.159403 env[1213]: time="2025-05-13T00:30:19.159325498Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:30:19.159627 env[1213]: time="2025-05-13T00:30:19.159577296Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:30:19.159734 env[1213]: time="2025-05-13T00:30:19.159712975Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:30:19.160320 env[1213]: time="2025-05-13T00:30:19.160284650Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67 pid=4279 runtime=io.containerd.runc.v2 May 13 00:30:19.179220 systemd[1]: Started cri-containerd-21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67.scope. May 13 00:30:19.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit: BPF prog-id=183 op=LOAD May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4279 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373236653233323062343838666361656561376633353231663464 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4279 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373236653233323062343838666361656561376633353231663464 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit: BPF prog-id=184 op=LOAD May 13 00:30:19.212000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4279 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373236653233323062343838666361656561376633353231663464 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit: BPF prog-id=185 op=LOAD May 13 00:30:19.212000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4279 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373236653233323062343838666361656561376633353231663464 May 13 00:30:19.212000 audit: BPF prog-id=185 op=UNLOAD May 13 00:30:19.212000 audit: BPF prog-id=184 op=UNLOAD May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.212000 audit: BPF prog-id=186 op=LOAD May 13 00:30:19.212000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4279 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373236653233323062343838666361656561376633353231663464 May 13 00:30:19.214984 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:30:19.233689 env[1213]: time="2025-05-13T00:30:19.233488670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f97d46c48-sd47w,Uid:51da0a36-b2ef-4a0f-8dc9-79c48712ed6b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67\"" May 13 00:30:19.354235 env[1213]: time="2025-05-13T00:30:19.354177688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:19.355379 env[1213]: time="2025-05-13T00:30:19.355346239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:19.357117 env[1213]: time="2025-05-13T00:30:19.357079184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:19.358329 env[1213]: time="2025-05-13T00:30:19.358289934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:19.358959 env[1213]: time="2025-05-13T00:30:19.358928208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 13 00:30:19.361137 env[1213]: time="2025-05-13T00:30:19.361114350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:30:19.371420 env[1213]: time="2025-05-13T00:30:19.371387623Z" level=info msg="CreateContainer within sandbox \"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:30:19.380737 env[1213]: time="2025-05-13T00:30:19.380697024Z" level=info msg="CreateContainer within sandbox \"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9071c559e670684ea69e5e7a0619e2d51b0d0c718d4abd7e0eae0253160f24d9\"" May 13 00:30:19.381145 env[1213]: time="2025-05-13T00:30:19.381120700Z" level=info msg="StartContainer for \"9071c559e670684ea69e5e7a0619e2d51b0d0c718d4abd7e0eae0253160f24d9\"" May 13 00:30:19.395326 systemd[1]: Started cri-containerd-9071c559e670684ea69e5e7a0619e2d51b0d0c718d4abd7e0eae0253160f24d9.scope. May 13 00:30:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit: BPF prog-id=187 op=LOAD May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3925 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373163353539653637303638346561363965356537613036313965 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3925 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373163353539653637303638346561363965356537613036313965 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.418000 audit: BPF prog-id=188 op=LOAD May 13 00:30:19.418000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3925 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373163353539653637303638346561363965356537613036313965 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit: BPF prog-id=189 op=LOAD May 13 00:30:19.419000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3925 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373163353539653637303638346561363965356537613036313965 May 13 00:30:19.419000 audit: BPF prog-id=189 op=UNLOAD May 13 00:30:19.419000 audit: BPF prog-id=188 op=UNLOAD May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:19.419000 audit: BPF prog-id=190 op=LOAD May 13 00:30:19.419000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3925 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373163353539653637303638346561363965356537613036313965 May 13 00:30:19.480719 env[1213]: time="2025-05-13T00:30:19.480665337Z" level=info msg="StartContainer for \"9071c559e670684ea69e5e7a0619e2d51b0d0c718d4abd7e0eae0253160f24d9\" returns successfully" May 13 00:30:19.789934 systemd-networkd[1036]: calic5796a17177: Gained IPv6LL May 13 00:30:20.091167 kubelet[2050]: I0513 00:30:20.090835 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7c5d49cfff-stkqm" podStartSLOduration=22.108210426 podStartE2EDuration="24.09081767s" podCreationTimestamp="2025-05-13 00:29:56 +0000 UTC" firstStartedPulling="2025-05-13 00:30:17.377484234 +0000 UTC m=+43.582595206" lastFinishedPulling="2025-05-13 00:30:19.360091478 +0000 UTC m=+45.565202450" observedRunningTime="2025-05-13 00:30:20.045429725 +0000 UTC m=+46.250540697" watchObservedRunningTime="2025-05-13 00:30:20.09081767 +0000 UTC m=+46.295928642" May 13 00:30:20.493952 systemd-networkd[1036]: cali2e7af833bc1: Gained IPv6LL May 13 00:30:20.525534 env[1213]: time="2025-05-13T00:30:20.525480927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:20.526895 env[1213]: time="2025-05-13T00:30:20.526867316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:20.528575 env[1213]: time="2025-05-13T00:30:20.528534302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:20.529916 env[1213]: time="2025-05-13T00:30:20.529890531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:20.530291 env[1213]: time="2025-05-13T00:30:20.530266568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 13 00:30:20.531470 env[1213]: time="2025-05-13T00:30:20.531448118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:30:20.532382 env[1213]: time="2025-05-13T00:30:20.532342631Z" level=info msg="CreateContainer within sandbox \"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:30:20.545073 env[1213]: time="2025-05-13T00:30:20.544987767Z" level=info msg="CreateContainer within sandbox \"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"46f8c796140ade1295e3fb4722417cc672ffb41e1d8d58579d13d08f3fb035f3\"" May 13 00:30:20.545626 env[1213]: time="2025-05-13T00:30:20.545601521Z" level=info msg="StartContainer for \"46f8c796140ade1295e3fb4722417cc672ffb41e1d8d58579d13d08f3fb035f3\"" May 13 00:30:20.571906 systemd[1]: Started cri-containerd-46f8c796140ade1295e3fb4722417cc672ffb41e1d8d58579d13d08f3fb035f3.scope. May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3986 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:20.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663863373936313430616465313239356533666234373232343137 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit: BPF prog-id=191 op=LOAD May 13 00:30:20.592000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3986 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:20.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663863373936313430616465313239356533666234373232343137 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit: BPF prog-id=192 op=LOAD May 13 00:30:20.592000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3986 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:20.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663863373936313430616465313239356533666234373232343137 May 13 00:30:20.592000 audit: BPF prog-id=192 op=UNLOAD May 13 00:30:20.592000 audit: BPF prog-id=191 op=UNLOAD May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:20.592000 audit: BPF prog-id=193 op=LOAD May 13 00:30:20.592000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3986 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:20.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663863373936313430616465313239356533666234373232343137 May 13 00:30:20.620673 env[1213]: time="2025-05-13T00:30:20.620626623Z" level=info msg="StartContainer for \"46f8c796140ade1295e3fb4722417cc672ffb41e1d8d58579d13d08f3fb035f3\" returns successfully" May 13 00:30:22.664750 env[1213]: time="2025-05-13T00:30:22.664689955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.670663 env[1213]: time="2025-05-13T00:30:22.670625989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.672426 env[1213]: time="2025-05-13T00:30:22.672393495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.673882 env[1213]: time="2025-05-13T00:30:22.673849363Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.674316 env[1213]: time="2025-05-13T00:30:22.674289440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 13 00:30:22.676869 env[1213]: time="2025-05-13T00:30:22.676329704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:30:22.677228 env[1213]: time="2025-05-13T00:30:22.677112298Z" level=info msg="CreateContainer within sandbox \"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:30:22.688026 env[1213]: time="2025-05-13T00:30:22.687992253Z" level=info msg="CreateContainer within sandbox \"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1b188eda85cac97b1b69961d15a6492093abc782dfe76b6c4a39088b5409e06d\"" May 13 00:30:22.688600 env[1213]: time="2025-05-13T00:30:22.688570288Z" level=info msg="StartContainer for \"1b188eda85cac97b1b69961d15a6492093abc782dfe76b6c4a39088b5409e06d\"" May 13 00:30:22.719946 systemd[1]: Started cri-containerd-1b188eda85cac97b1b69961d15a6492093abc782dfe76b6c4a39088b5409e06d.scope. May 13 00:30:22.756530 kernel: kauditd_printk_skb: 476 callbacks suppressed May 13 00:30:22.756626 kernel: audit: type=1400 audit(1747096222.746:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.756652 kernel: audit: type=1400 audit(1747096222.746:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.756669 kernel: audit: type=1400 audit(1747096222.746:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.756690 kernel: audit: type=1400 audit(1747096222.746:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.760664 kernel: audit: type=1400 audit(1747096222.746:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.763114 kernel: audit: type=1400 audit(1747096222.746:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.763212 kernel: audit: type=1400 audit(1747096222.746:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.767906 kernel: audit: type=1400 audit(1747096222.746:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.767953 kernel: audit: type=1400 audit(1747096222.746:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.772660 kernel: audit: type=1400 audit(1747096222.747:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit: BPF prog-id=194 op=LOAD May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4165 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313838656461383563616339376231623639393631643135613634 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4165 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313838656461383563616339376231623639393631643135613634 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.747000 audit: BPF prog-id=195 op=LOAD May 13 00:30:22.747000 audit[4427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4165 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313838656461383563616339376231623639393631643135613634 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.749000 audit: BPF prog-id=196 op=LOAD May 13 00:30:22.749000 audit[4427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4165 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313838656461383563616339376231623639393631643135613634 May 13 00:30:22.751000 audit: BPF prog-id=196 op=UNLOAD May 13 00:30:22.751000 audit: BPF prog-id=195 op=UNLOAD May 13 00:30:22.752000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.752000 audit: BPF prog-id=197 op=LOAD May 13 00:30:22.752000 audit[4427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4165 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313838656461383563616339376231623639393631643135613634 May 13 00:30:22.787222 env[1213]: time="2025-05-13T00:30:22.787178518Z" level=info msg="StartContainer for \"1b188eda85cac97b1b69961d15a6492093abc782dfe76b6c4a39088b5409e06d\" returns successfully" May 13 00:30:22.796710 systemd[1]: Started sshd@13-10.0.0.75:22-10.0.0.1:57814.service. May 13 00:30:22.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.75:22-10.0.0.1:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:22.844000 audit[4455]: USER_ACCT pid=4455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:22.846421 sshd[4455]: Accepted publickey for core from 10.0.0.1 port 57814 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:22.845000 audit[4455]: CRED_ACQ pid=4455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:22.845000 audit[4455]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5ca36e0 a2=3 a3=1 items=0 ppid=1 pid=4455 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:22.848129 sshd[4455]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:22.851676 systemd-logind[1200]: New session 14 of user core. May 13 00:30:22.852524 systemd[1]: Started session-14.scope. May 13 00:30:22.854000 audit[4455]: USER_START pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:22.856000 audit[4459]: CRED_ACQ pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:22.898011 env[1213]: time="2025-05-13T00:30:22.897954172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.899669 env[1213]: time="2025-05-13T00:30:22.899637279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.901246 env[1213]: time="2025-05-13T00:30:22.901209787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.902688 env[1213]: time="2025-05-13T00:30:22.902658655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:22.903401 env[1213]: time="2025-05-13T00:30:22.903365410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 13 00:30:22.905304 env[1213]: time="2025-05-13T00:30:22.905272435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:30:22.908368 env[1213]: time="2025-05-13T00:30:22.908335331Z" level=info msg="CreateContainer within sandbox \"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:30:22.920636 env[1213]: time="2025-05-13T00:30:22.920551715Z" level=info msg="CreateContainer within sandbox \"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ccda7b42fd7c1e6382b50f2f5b24c17cbdd4000d511575ad981ec3e1b04d03b5\"" May 13 00:30:22.921162 env[1213]: time="2025-05-13T00:30:22.921134351Z" level=info msg="StartContainer for \"ccda7b42fd7c1e6382b50f2f5b24c17cbdd4000d511575ad981ec3e1b04d03b5\"" May 13 00:30:22.936707 systemd[1]: Started cri-containerd-ccda7b42fd7c1e6382b50f2f5b24c17cbdd4000d511575ad981ec3e1b04d03b5.scope. May 13 00:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit: BPF prog-id=198 op=LOAD May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4279 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363646137623432666437633165363338326235306632663562323463 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4279 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363646137623432666437633165363338326235306632663562323463 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit: BPF prog-id=199 op=LOAD May 13 00:30:22.965000 audit[4476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4279 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363646137623432666437633165363338326235306632663562323463 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit: BPF prog-id=200 op=LOAD May 13 00:30:22.965000 audit[4476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4279 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363646137623432666437633165363338326235306632663562323463 May 13 00:30:22.965000 audit: BPF prog-id=200 op=UNLOAD May 13 00:30:22.965000 audit: BPF prog-id=199 op=UNLOAD May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:22.965000 audit: BPF prog-id=201 op=LOAD May 13 00:30:22.965000 audit[4476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4279 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363646137623432666437633165363338326235306632663562323463 May 13 00:30:22.994310 env[1213]: time="2025-05-13T00:30:22.993739864Z" level=info msg="StartContainer for \"ccda7b42fd7c1e6382b50f2f5b24c17cbdd4000d511575ad981ec3e1b04d03b5\" returns successfully" May 13 00:30:23.047041 kubelet[2050]: I0513 00:30:23.046976 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f97d46c48-sd47w" podStartSLOduration=24.377270675 podStartE2EDuration="28.046962777s" podCreationTimestamp="2025-05-13 00:29:55 +0000 UTC" firstStartedPulling="2025-05-13 00:30:19.235147256 +0000 UTC m=+45.440258188" lastFinishedPulling="2025-05-13 00:30:22.904839318 +0000 UTC m=+49.109950290" observedRunningTime="2025-05-13 00:30:23.046700339 +0000 UTC m=+49.251811311" watchObservedRunningTime="2025-05-13 00:30:23.046962777 +0000 UTC m=+49.252073749" May 13 00:30:23.064111 sshd[4455]: pam_unix(sshd:session): session closed for user core May 13 00:30:23.064000 audit[4455]: USER_END pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:23.064000 audit[4455]: CRED_DISP pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:23.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.75:22-10.0.0.1:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:23.067539 systemd[1]: sshd@13-10.0.0.75:22-10.0.0.1:57814.service: Deactivated successfully. May 13 00:30:23.068281 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:30:23.067000 audit[4504]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:23.067000 audit[4504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe6c16590 a2=0 a3=1 items=0 ppid=2254 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:23.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:23.069165 systemd-logind[1200]: Session 14 logged out. Waiting for processes to exit. May 13 00:30:23.069989 systemd-logind[1200]: Removed session 14. May 13 00:30:23.073000 audit[4504]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:23.073000 audit[4504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe6c16590 a2=0 a3=1 items=0 ppid=2254 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:23.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:23.088000 audit[4511]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:23.088000 audit[4511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd3bd37d0 a2=0 a3=1 items=0 ppid=2254 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:23.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:23.093000 audit[4511]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:23.093000 audit[4511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd3bd37d0 a2=0 a3=1 items=0 ppid=2254 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:23.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:23.686843 systemd[1]: run-containerd-runc-k8s.io-1b188eda85cac97b1b69961d15a6492093abc782dfe76b6c4a39088b5409e06d-runc.s6ZsFd.mount: Deactivated successfully. May 13 00:30:23.850000 audit[4486]: AVC avc: denied { watch } for pid=4486 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_30_04.325160951/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c485,c907 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c485,c907 tclass=file permissive=0 May 13 00:30:23.850000 audit[4486]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000c129a0 a2=fc6 a3=0 items=0 ppid=4279 pid=4486 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c485,c907 key=(null) May 13 00:30:23.850000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:30:23.932000 audit[4438]: AVC avc: denied { watch } for pid=4438 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_30_04.4224723092/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c959 tclass=file permissive=0 May 13 00:30:23.932000 audit[4438]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40011d1aa0 a2=fc6 a3=0 items=0 ppid=4165 pid=4438 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c959 key=(null) May 13 00:30:23.932000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:30:23.955157 kubelet[2050]: I0513 00:30:23.955021 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f97d46c48-zj7g5" podStartSLOduration=24.449199108 podStartE2EDuration="28.955004946s" podCreationTimestamp="2025-05-13 00:29:55 +0000 UTC" firstStartedPulling="2025-05-13 00:30:18.169717072 +0000 UTC m=+44.374828044" lastFinishedPulling="2025-05-13 00:30:22.67552291 +0000 UTC m=+48.880633882" observedRunningTime="2025-05-13 00:30:23.063342172 +0000 UTC m=+49.268453144" watchObservedRunningTime="2025-05-13 00:30:23.955004946 +0000 UTC m=+50.160115918" May 13 00:30:24.042776 kubelet[2050]: I0513 00:30:24.042743 2050 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:30:24.109000 audit[4515]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:24.109000 audit[4515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffceb65950 a2=0 a3=1 items=0 ppid=2254 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:24.115000 audit[4515]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:24.115000 audit[4515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffceb65950 a2=0 a3=1 items=0 ppid=2254 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:24.263765 env[1213]: time="2025-05-13T00:30:24.263651769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:24.265838 env[1213]: time="2025-05-13T00:30:24.265800393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:24.267382 env[1213]: time="2025-05-13T00:30:24.267344542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:24.269602 env[1213]: time="2025-05-13T00:30:24.269560486Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:30:24.270151 env[1213]: time="2025-05-13T00:30:24.270111521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 13 00:30:24.272501 env[1213]: time="2025-05-13T00:30:24.272470784Z" level=info msg="CreateContainer within sandbox \"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:30:24.294948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount627676073.mount: Deactivated successfully. May 13 00:30:24.302300 env[1213]: time="2025-05-13T00:30:24.302249443Z" level=info msg="CreateContainer within sandbox \"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ef72fa13e6d42218aef09784722c1d50b7f346b3197efcb5baedd34fd538a20c\"" May 13 00:30:24.302767 env[1213]: time="2025-05-13T00:30:24.302736080Z" level=info msg="StartContainer for \"ef72fa13e6d42218aef09784722c1d50b7f346b3197efcb5baedd34fd538a20c\"" May 13 00:30:24.361171 systemd[1]: Started cri-containerd-ef72fa13e6d42218aef09784722c1d50b7f346b3197efcb5baedd34fd538a20c.scope. May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001175a0 a2=3c a3=0 items=0 ppid=3986 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373266613133653664343232313861656630393738343732326331 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit: BPF prog-id=202 op=LOAD May 13 00:30:24.386000 audit[4526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001178e0 a2=78 a3=0 items=0 ppid=3986 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373266613133653664343232313861656630393738343732326331 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit: BPF prog-id=203 op=LOAD May 13 00:30:24.386000 audit[4526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000117670 a2=78 a3=0 items=0 ppid=3986 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373266613133653664343232313861656630393738343732326331 May 13 00:30:24.386000 audit: BPF prog-id=203 op=UNLOAD May 13 00:30:24.386000 audit: BPF prog-id=202 op=UNLOAD May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { perfmon } for pid=4526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit[4526]: AVC avc: denied { bpf } for pid=4526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:30:24.386000 audit: BPF prog-id=204 op=LOAD May 13 00:30:24.386000 audit[4526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000117b40 a2=78 a3=0 items=0 ppid=3986 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373266613133653664343232313861656630393738343732326331 May 13 00:30:24.424037 env[1213]: time="2025-05-13T00:30:24.423967181Z" level=info msg="StartContainer for \"ef72fa13e6d42218aef09784722c1d50b7f346b3197efcb5baedd34fd538a20c\" returns successfully" May 13 00:30:24.945734 kubelet[2050]: I0513 00:30:24.945702 2050 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:30:24.947316 kubelet[2050]: I0513 00:30:24.947294 2050 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:30:25.979676 kubelet[2050]: I0513 00:30:25.979630 2050 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:30:26.001687 kubelet[2050]: I0513 00:30:26.001620 2050 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-z485v" podStartSLOduration=23.13587043 podStartE2EDuration="30.001604399s" podCreationTimestamp="2025-05-13 00:29:56 +0000 UTC" firstStartedPulling="2025-05-13 00:30:17.405484584 +0000 UTC m=+43.610595516" lastFinishedPulling="2025-05-13 00:30:24.271218513 +0000 UTC m=+50.476329485" observedRunningTime="2025-05-13 00:30:25.056754421 +0000 UTC m=+51.261865393" watchObservedRunningTime="2025-05-13 00:30:26.001604399 +0000 UTC m=+52.206715371" May 13 00:30:26.014000 audit[4556]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:26.014000 audit[4556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffccb60e50 a2=0 a3=1 items=0 ppid=2254 pid=4556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:26.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:26.029000 audit[4556]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:26.029000 audit[4556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffccb60e50 a2=0 a3=1 items=0 ppid=2254 pid=4556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:26.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:28.068735 systemd[1]: Started sshd@14-10.0.0.75:22-10.0.0.1:57826.service. May 13 00:30:28.070534 kernel: kauditd_printk_skb: 188 callbacks suppressed May 13 00:30:28.070616 kernel: audit: type=1130 audit(1747096228.067:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.75:22-10.0.0.1:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.75:22-10.0.0.1:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.112618 sshd[4558]: Accepted publickey for core from 10.0.0.1 port 57826 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:28.111000 audit[4558]: USER_ACCT pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.114000 audit[4558]: CRED_ACQ pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.119558 kernel: audit: type=1101 audit(1747096228.111:1406): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.119605 kernel: audit: type=1103 audit(1747096228.114:1407): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.119874 sshd[4558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:28.122183 kernel: audit: type=1006 audit(1747096228.114:1408): pid=4558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 00:30:28.114000 audit[4558]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3f9cae0 a2=3 a3=1 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:28.125842 kernel: audit: type=1300 audit(1747096228.114:1408): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3f9cae0 a2=3 a3=1 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:28.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:28.127228 kernel: audit: type=1327 audit(1747096228.114:1408): proctitle=737368643A20636F7265205B707269765D May 13 00:30:28.129548 systemd-logind[1200]: New session 15 of user core. May 13 00:30:28.130358 systemd[1]: Started session-15.scope. May 13 00:30:28.132000 audit[4558]: USER_START pid=4558 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.136000 audit[4560]: CRED_ACQ pid=4560 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.140923 kernel: audit: type=1105 audit(1747096228.132:1409): pid=4558 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.140999 kernel: audit: type=1103 audit(1747096228.136:1410): pid=4560 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.286335 sshd[4558]: pam_unix(sshd:session): session closed for user core May 13 00:30:28.286000 audit[4558]: USER_END pid=4558 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.291562 kernel: audit: type=1106 audit(1747096228.286:1411): pid=4558 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.290359 systemd[1]: Started sshd@15-10.0.0.75:22-10.0.0.1:57842.service. May 13 00:30:28.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.75:22-10.0.0.1:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.293848 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:30:28.294386 systemd-logind[1200]: Session 15 logged out. Waiting for processes to exit. May 13 00:30:28.294494 systemd[1]: sshd@14-10.0.0.75:22-10.0.0.1:57826.service: Deactivated successfully. May 13 00:30:28.290000 audit[4558]: CRED_DISP pid=4558 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.75:22-10.0.0.1:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.295533 kernel: audit: type=1130 audit(1747096228.290:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.75:22-10.0.0.1:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.295498 systemd-logind[1200]: Removed session 15. May 13 00:30:28.325000 audit[4571]: USER_ACCT pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.327100 sshd[4571]: Accepted publickey for core from 10.0.0.1 port 57842 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:28.326000 audit[4571]: CRED_ACQ pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.326000 audit[4571]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff98e4ce0 a2=3 a3=1 items=0 ppid=1 pid=4571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:28.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:28.328576 sshd[4571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:28.331786 systemd-logind[1200]: New session 16 of user core. May 13 00:30:28.332626 systemd[1]: Started session-16.scope. May 13 00:30:28.334000 audit[4571]: USER_START pid=4571 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.335000 audit[4574]: CRED_ACQ pid=4574 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.566887 sshd[4571]: pam_unix(sshd:session): session closed for user core May 13 00:30:28.566000 audit[4571]: USER_END pid=4571 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.566000 audit[4571]: CRED_DISP pid=4571 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.571025 systemd[1]: Started sshd@16-10.0.0.75:22-10.0.0.1:57854.service. May 13 00:30:28.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.75:22-10.0.0.1:57854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.571834 systemd[1]: sshd@15-10.0.0.75:22-10.0.0.1:57842.service: Deactivated successfully. May 13 00:30:28.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.75:22-10.0.0.1:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:28.572849 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:30:28.573561 systemd-logind[1200]: Session 16 logged out. Waiting for processes to exit. May 13 00:30:28.574238 systemd-logind[1200]: Removed session 16. May 13 00:30:28.609000 audit[4583]: USER_ACCT pid=4583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.611300 sshd[4583]: Accepted publickey for core from 10.0.0.1 port 57854 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:28.610000 audit[4583]: CRED_ACQ pid=4583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.611000 audit[4583]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe4c5f30 a2=3 a3=1 items=0 ppid=1 pid=4583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:28.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:28.612855 sshd[4583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:28.616887 systemd-logind[1200]: New session 17 of user core. May 13 00:30:28.617265 systemd[1]: Started session-17.scope. May 13 00:30:28.619000 audit[4583]: USER_START pid=4583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:28.620000 audit[4586]: CRED_ACQ pid=4586 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:29.680754 systemd[1]: run-containerd-runc-k8s.io-290d9be65d9ca3d2485735db29d1b128902c848868516eb8d24f7e0a03fb606f-runc.yFHhte.mount: Deactivated successfully. May 13 00:30:29.739604 kubelet[2050]: E0513 00:30:29.739568 2050 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:30:30.198000 audit[4623]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:30.198000 audit[4623]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdcc801c0 a2=0 a3=1 items=0 ppid=2254 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:30.202995 sshd[4583]: pam_unix(sshd:session): session closed for user core May 13 00:30:30.202000 audit[4583]: USER_END pid=4583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.202000 audit[4583]: CRED_DISP pid=4583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.205984 systemd[1]: sshd@16-10.0.0.75:22-10.0.0.1:57854.service: Deactivated successfully. May 13 00:30:30.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.75:22-10.0.0.1:57854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:30.206721 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:30:30.206000 audit[4623]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:30.209712 systemd-logind[1200]: Session 17 logged out. Waiting for processes to exit. May 13 00:30:30.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.75:22-10.0.0.1:57862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:30.211693 systemd[1]: Started sshd@17-10.0.0.75:22-10.0.0.1:57862.service. May 13 00:30:30.217349 systemd-logind[1200]: Removed session 17. May 13 00:30:30.206000 audit[4623]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffdcc801c0 a2=0 a3=1 items=0 ppid=2254 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:30.252000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.254192 sshd[4626]: Accepted publickey for core from 10.0.0.1 port 57862 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:30.253000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.253000 audit[4626]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9905c40 a2=3 a3=1 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:30.255793 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:30.260251 systemd[1]: Started session-18.scope. May 13 00:30:30.260383 systemd-logind[1200]: New session 18 of user core. May 13 00:30:30.264000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.265000 audit[4628]: CRED_ACQ pid=4628 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.285000 audit[4630]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:30.285000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff9147c70 a2=0 a3=1 items=0 ppid=2254 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:30.290000 audit[4630]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:30.290000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff9147c70 a2=0 a3=1 items=0 ppid=2254 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:30.509778 sshd[4626]: pam_unix(sshd:session): session closed for user core May 13 00:30:30.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.75:22-10.0.0.1:57876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:30.512978 systemd[1]: Started sshd@18-10.0.0.75:22-10.0.0.1:57876.service. May 13 00:30:30.513000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.513000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.75:22-10.0.0.1:57862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:30.516031 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:30:30.516728 systemd[1]: sshd@17-10.0.0.75:22-10.0.0.1:57862.service: Deactivated successfully. May 13 00:30:30.517317 systemd-logind[1200]: Session 18 logged out. Waiting for processes to exit. May 13 00:30:30.518175 systemd-logind[1200]: Removed session 18. May 13 00:30:30.547000 audit[4639]: USER_ACCT pid=4639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.549439 sshd[4639]: Accepted publickey for core from 10.0.0.1 port 57876 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:30.548000 audit[4639]: CRED_ACQ pid=4639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.548000 audit[4639]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8cfdbb0 a2=3 a3=1 items=0 ppid=1 pid=4639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:30.548000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:30.550648 sshd[4639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:30.554593 systemd-logind[1200]: New session 19 of user core. May 13 00:30:30.555665 systemd[1]: Started session-19.scope. May 13 00:30:30.563000 audit[4639]: USER_START pid=4639 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.564000 audit[4642]: CRED_ACQ pid=4642 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.694274 sshd[4639]: pam_unix(sshd:session): session closed for user core May 13 00:30:30.695000 audit[4639]: USER_END pid=4639 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.695000 audit[4639]: CRED_DISP pid=4639 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:30.698292 systemd-logind[1200]: Session 19 logged out. Waiting for processes to exit. May 13 00:30:30.698460 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:30:30.699702 systemd[1]: sshd@18-10.0.0.75:22-10.0.0.1:57876.service: Deactivated successfully. May 13 00:30:30.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.75:22-10.0.0.1:57876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:30.701100 systemd-logind[1200]: Removed session 19. May 13 00:30:31.393000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.393000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400ebdab80 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.393000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.393000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=40157a0f30 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.393000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.393000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4011fe57a0 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.394000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.394000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4013182960 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.399000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.399000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=401249cf90 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.399000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.399000 audit[1904]: AVC avc: denied { watch } for pid=1904 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.399000 audit[1904]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400ecb7220 a2=fc6 a3=0 items=0 ppid=1764 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c751 key=(null) May 13 00:30:31.399000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:30:31.579000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.579000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:31.579000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001c0bac0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:31.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:31.579000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001674e70 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:31.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:33.855129 env[1213]: time="2025-05-13T00:30:33.855086640Z" level=info msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.897 [WARNING][4673] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67", Pod:"calico-apiserver-5f97d46c48-sd47w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e7af833bc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.897 [INFO][4673] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.897 [INFO][4673] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" iface="eth0" netns="" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.897 [INFO][4673] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.897 [INFO][4673] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.930 [INFO][4683] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.931 [INFO][4683] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.931 [INFO][4683] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.939 [WARNING][4683] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.939 [INFO][4683] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.941 [INFO][4683] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:33.945241 env[1213]: 2025-05-13 00:30:33.943 [INFO][4673] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:33.945697 env[1213]: time="2025-05-13T00:30:33.945273509Z" level=info msg="TearDown network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" successfully" May 13 00:30:33.945697 env[1213]: time="2025-05-13T00:30:33.945302989Z" level=info msg="StopPodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" returns successfully" May 13 00:30:33.945869 env[1213]: time="2025-05-13T00:30:33.945831066Z" level=info msg="RemovePodSandbox for \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" May 13 00:30:33.945923 env[1213]: time="2025-05-13T00:30:33.945871506Z" level=info msg="Forcibly stopping sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\"" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:33.982 [WARNING][4706] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"51da0a36-b2ef-4a0f-8dc9-79c48712ed6b", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"21726e2320b488fcaeea7f3521f4d31c7a90be1d116ee37b486912a1a799ce67", Pod:"calico-apiserver-5f97d46c48-sd47w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e7af833bc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:33.983 [INFO][4706] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:33.983 [INFO][4706] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" iface="eth0" netns="" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:33.983 [INFO][4706] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:33.983 [INFO][4706] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.004 [INFO][4715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.004 [INFO][4715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.004 [INFO][4715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.012 [WARNING][4715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.012 [INFO][4715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" HandleID="k8s-pod-network.f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" Workload="localhost-k8s-calico--apiserver--5f97d46c48--sd47w-eth0" May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.014 [INFO][4715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.017939 env[1213]: 2025-05-13 00:30:34.016 [INFO][4706] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf" May 13 00:30:34.018498 env[1213]: time="2025-05-13T00:30:34.017961364Z" level=info msg="TearDown network for sandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" successfully" May 13 00:30:34.025863 env[1213]: time="2025-05-13T00:30:34.025807959Z" level=info msg="RemovePodSandbox \"f1aba013712350f9391f54e463974267c1a1b43ae340b60ad857f41b06f53adf\" returns successfully" May 13 00:30:34.026568 env[1213]: time="2025-05-13T00:30:34.026542475Z" level=info msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.076 [WARNING][4737] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"808b1078-7671-444d-9ef9-9601e2f5d633", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e", Pod:"coredns-7db6d8ff4d-2n4wr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f03eb9ce3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.076 [INFO][4737] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.076 [INFO][4737] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" iface="eth0" netns="" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.076 [INFO][4737] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.076 [INFO][4737] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.096 [INFO][4746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.096 [INFO][4746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.096 [INFO][4746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.105 [WARNING][4746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.105 [INFO][4746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.106 [INFO][4746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.110876 env[1213]: 2025-05-13 00:30:34.108 [INFO][4737] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.110876 env[1213]: time="2025-05-13T00:30:34.109711677Z" level=info msg="TearDown network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" successfully" May 13 00:30:34.110876 env[1213]: time="2025-05-13T00:30:34.109742997Z" level=info msg="StopPodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" returns successfully" May 13 00:30:34.110876 env[1213]: time="2025-05-13T00:30:34.110151634Z" level=info msg="RemovePodSandbox for \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" May 13 00:30:34.110876 env[1213]: time="2025-05-13T00:30:34.110184354Z" level=info msg="Forcibly stopping sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\"" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.145 [WARNING][4768] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"808b1078-7671-444d-9ef9-9601e2f5d633", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da25f4c87e4c31177a6f4dfc781502bf52029627321a0dbbbfd2d80bdfa83d2e", Pod:"coredns-7db6d8ff4d-2n4wr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f03eb9ce3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.146 [INFO][4768] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.146 [INFO][4768] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" iface="eth0" netns="" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.146 [INFO][4768] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.146 [INFO][4768] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.166 [INFO][4777] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.167 [INFO][4777] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.167 [INFO][4777] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.176 [WARNING][4777] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.176 [INFO][4777] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" HandleID="k8s-pod-network.f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" Workload="localhost-k8s-coredns--7db6d8ff4d--2n4wr-eth0" May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.177 [INFO][4777] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.181296 env[1213]: 2025-05-13 00:30:34.179 [INFO][4768] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82" May 13 00:30:34.181753 env[1213]: time="2025-05-13T00:30:34.181331146Z" level=info msg="TearDown network for sandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" successfully" May 13 00:30:34.208717 env[1213]: time="2025-05-13T00:30:34.208653389Z" level=info msg="RemovePodSandbox \"f2109e68fecd563a6dc3dae0efb3efd70487be8d5a235ff67862622d73d10a82\" returns successfully" May 13 00:30:34.209160 env[1213]: time="2025-05-13T00:30:34.209129586Z" level=info msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.249 [WARNING][4799] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf", Pod:"calico-apiserver-5f97d46c48-zj7g5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5796a17177", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.249 [INFO][4799] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.249 [INFO][4799] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" iface="eth0" netns="" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.249 [INFO][4799] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.249 [INFO][4799] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.269 [INFO][4807] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.269 [INFO][4807] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.270 [INFO][4807] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.278 [WARNING][4807] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.278 [INFO][4807] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.280 [INFO][4807] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.283341 env[1213]: 2025-05-13 00:30:34.282 [INFO][4799] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.283892 env[1213]: time="2025-05-13T00:30:34.283372080Z" level=info msg="TearDown network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" successfully" May 13 00:30:34.283892 env[1213]: time="2025-05-13T00:30:34.283410159Z" level=info msg="StopPodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" returns successfully" May 13 00:30:34.284475 env[1213]: time="2025-05-13T00:30:34.284436754Z" level=info msg="RemovePodSandbox for \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" May 13 00:30:34.284545 env[1213]: time="2025-05-13T00:30:34.284479033Z" level=info msg="Forcibly stopping sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\"" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.317 [WARNING][4829] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0", GenerateName:"calico-apiserver-5f97d46c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1d03b2d-00e3-4cc8-b34f-0a7d72b89974", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f97d46c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1cdbfffdcf87a6aafb478ca07294e6f34e1dfd9cdb2709501202d2cefe25c9cf", Pod:"calico-apiserver-5f97d46c48-zj7g5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5796a17177", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.317 [INFO][4829] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.318 [INFO][4829] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" iface="eth0" netns="" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.318 [INFO][4829] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.318 [INFO][4829] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.340 [INFO][4837] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.340 [INFO][4837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.340 [INFO][4837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.348 [WARNING][4837] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.349 [INFO][4837] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" HandleID="k8s-pod-network.10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" Workload="localhost-k8s-calico--apiserver--5f97d46c48--zj7g5-eth0" May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.350 [INFO][4837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.353952 env[1213]: 2025-05-13 00:30:34.352 [INFO][4829] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555" May 13 00:30:34.354360 env[1213]: time="2025-05-13T00:30:34.353985194Z" level=info msg="TearDown network for sandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" successfully" May 13 00:30:34.360663 env[1213]: time="2025-05-13T00:30:34.360617756Z" level=info msg="RemovePodSandbox \"10712124214a4351b26b982d636e42fc2acab6e34df459b2cb26e8c9b23c6555\" returns successfully" May 13 00:30:34.363264 env[1213]: time="2025-05-13T00:30:34.361215793Z" level=info msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.397 [WARNING][4859] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--z485v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670", Pod:"csi-node-driver-z485v", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali73574814dbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.397 [INFO][4859] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.397 [INFO][4859] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" iface="eth0" netns="" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.397 [INFO][4859] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.397 [INFO][4859] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.416 [INFO][4867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.416 [INFO][4867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.416 [INFO][4867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.424 [WARNING][4867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.424 [INFO][4867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.426 [INFO][4867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.429242 env[1213]: 2025-05-13 00:30:34.428 [INFO][4859] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.429830 env[1213]: time="2025-05-13T00:30:34.429286042Z" level=info msg="TearDown network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" successfully" May 13 00:30:34.429830 env[1213]: time="2025-05-13T00:30:34.429324201Z" level=info msg="StopPodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" returns successfully" May 13 00:30:34.430352 env[1213]: time="2025-05-13T00:30:34.430319156Z" level=info msg="RemovePodSandbox for \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" May 13 00:30:34.430426 env[1213]: time="2025-05-13T00:30:34.430387195Z" level=info msg="Forcibly stopping sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\"" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.465 [WARNING][4890] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--z485v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3637d5ad-bcd1-4c1a-963d-45c2e6ce1cf0", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1425571ae197f8d8e2bc9ef70a11b754435e2d8e3395653cead3230ff2672670", Pod:"csi-node-driver-z485v", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali73574814dbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.465 [INFO][4890] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.465 [INFO][4890] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" iface="eth0" netns="" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.465 [INFO][4890] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.465 [INFO][4890] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.483 [INFO][4898] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.484 [INFO][4898] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.484 [INFO][4898] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.492 [WARNING][4898] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.492 [INFO][4898] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" HandleID="k8s-pod-network.5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" Workload="localhost-k8s-csi--node--driver--z485v-eth0" May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.493 [INFO][4898] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.496958 env[1213]: 2025-05-13 00:30:34.495 [INFO][4890] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c" May 13 00:30:34.497456 env[1213]: time="2025-05-13T00:30:34.496987013Z" level=info msg="TearDown network for sandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" successfully" May 13 00:30:34.499717 env[1213]: time="2025-05-13T00:30:34.499689917Z" level=info msg="RemovePodSandbox \"5b97182b0190377bdc901f8ea5567e7112300df035cb289114267456c4d30f9c\" returns successfully" May 13 00:30:34.500179 env[1213]: time="2025-05-13T00:30:34.500149955Z" level=info msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.533 [WARNING][4920] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0", GenerateName:"calico-kube-controllers-7c5d49cfff-", Namespace:"calico-system", SelfLink:"", UID:"3f81aff2-a800-419b-b27a-0164800c9964", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5d49cfff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b", Pod:"calico-kube-controllers-7c5d49cfff-stkqm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicb7b4039b59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.533 [INFO][4920] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.534 [INFO][4920] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" iface="eth0" netns="" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.534 [INFO][4920] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.534 [INFO][4920] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.552 [INFO][4929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.552 [INFO][4929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.552 [INFO][4929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.564 [WARNING][4929] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.564 [INFO][4929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.566 [INFO][4929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.569970 env[1213]: 2025-05-13 00:30:34.568 [INFO][4920] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.570413 env[1213]: time="2025-05-13T00:30:34.569980754Z" level=info msg="TearDown network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" successfully" May 13 00:30:34.570413 env[1213]: time="2025-05-13T00:30:34.570013234Z" level=info msg="StopPodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" returns successfully" May 13 00:30:34.570629 env[1213]: time="2025-05-13T00:30:34.570578430Z" level=info msg="RemovePodSandbox for \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" May 13 00:30:34.570680 env[1213]: time="2025-05-13T00:30:34.570617190Z" level=info msg="Forcibly stopping sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\"" May 13 00:30:34.591380 systemd[1]: run-containerd-runc-k8s.io-9071c559e670684ea69e5e7a0619e2d51b0d0c718d4abd7e0eae0253160f24d9-runc.uXqxpj.mount: Deactivated successfully. May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.615 [WARNING][4959] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0", GenerateName:"calico-kube-controllers-7c5d49cfff-", Namespace:"calico-system", SelfLink:"", UID:"3f81aff2-a800-419b-b27a-0164800c9964", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5d49cfff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"338658fd5f0bf017c7236c7183a6239a514822fa4541a920227e45248a414e4b", Pod:"calico-kube-controllers-7c5d49cfff-stkqm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicb7b4039b59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.616 [INFO][4959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.616 [INFO][4959] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" iface="eth0" netns="" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.616 [INFO][4959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.616 [INFO][4959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.638 [INFO][4978] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.638 [INFO][4978] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.638 [INFO][4978] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.647 [WARNING][4978] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.647 [INFO][4978] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" HandleID="k8s-pod-network.0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" Workload="localhost-k8s-calico--kube--controllers--7c5d49cfff--stkqm-eth0" May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.648 [INFO][4978] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.653955 env[1213]: 2025-05-13 00:30:34.650 [INFO][4959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722" May 13 00:30:34.654437 env[1213]: time="2025-05-13T00:30:34.654391389Z" level=info msg="TearDown network for sandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" successfully" May 13 00:30:34.657296 env[1213]: time="2025-05-13T00:30:34.657263412Z" level=info msg="RemovePodSandbox \"0befb704369c788a9c5e0719a10ed5f3fd1a35db1fac86f10cf18495587e3722\" returns successfully" May 13 00:30:34.657957 env[1213]: time="2025-05-13T00:30:34.657923769Z" level=info msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.692 [WARNING][5006] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"df527755-957c-41fc-9212-bd1ca7c2eb08", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f", Pod:"coredns-7db6d8ff4d-qmrsd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie530b4b975b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.692 [INFO][5006] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.692 [INFO][5006] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" iface="eth0" netns="" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.692 [INFO][5006] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.692 [INFO][5006] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.711 [INFO][5014] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.712 [INFO][5014] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.712 [INFO][5014] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.722 [WARNING][5014] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.722 [INFO][5014] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.724 [INFO][5014] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.727380 env[1213]: 2025-05-13 00:30:34.725 [INFO][5006] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.727834 env[1213]: time="2025-05-13T00:30:34.727412570Z" level=info msg="TearDown network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" successfully" May 13 00:30:34.727834 env[1213]: time="2025-05-13T00:30:34.727442809Z" level=info msg="StopPodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" returns successfully" May 13 00:30:34.727944 env[1213]: time="2025-05-13T00:30:34.727913607Z" level=info msg="RemovePodSandbox for \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" May 13 00:30:34.728003 env[1213]: time="2025-05-13T00:30:34.727966246Z" level=info msg="Forcibly stopping sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\"" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.763 [WARNING][5036] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"df527755-957c-41fc-9212-bd1ca7c2eb08", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce83c6297d0db1a2b909a7b1a5bb5c850e9a527be058fd6733140cb4c3aee00f", Pod:"coredns-7db6d8ff4d-qmrsd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie530b4b975b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.764 [INFO][5036] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.764 [INFO][5036] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" iface="eth0" netns="" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.764 [INFO][5036] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.764 [INFO][5036] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.785 [INFO][5044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.785 [INFO][5044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.785 [INFO][5044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.794 [WARNING][5044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.794 [INFO][5044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" HandleID="k8s-pod-network.aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" Workload="localhost-k8s-coredns--7db6d8ff4d--qmrsd-eth0" May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.796 [INFO][5044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:30:34.799763 env[1213]: 2025-05-13 00:30:34.798 [INFO][5036] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720" May 13 00:30:34.800197 env[1213]: time="2025-05-13T00:30:34.799778394Z" level=info msg="TearDown network for sandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" successfully" May 13 00:30:34.819768 env[1213]: time="2025-05-13T00:30:34.819697160Z" level=info msg="RemovePodSandbox \"aeb090bffed9b9239765471cfe7426fa87971377cada0e97efa38ddc0a25e720\" returns successfully" May 13 00:30:34.963000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.966012 kernel: kauditd_printk_skb: 81 callbacks suppressed May 13 00:30:34.966086 kernel: audit: type=1400 audit(1747096234.963:1462): avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.963000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001c0bf60 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.972731 kernel: audit: type=1300 audit(1747096234.963:1462): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001c0bf60 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.972796 kernel: audit: type=1400 audit(1747096234.963:1463): avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.963000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.975556 kernel: audit: type=1327 audit(1747096234.963:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.963000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f9da80 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.982495 kernel: audit: type=1300 audit(1747096234.963:1463): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f9da80 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.982577 kernel: audit: type=1327 audit(1747096234.963:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.963000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.988707 kernel: audit: type=1400 audit(1747096234.963:1464): avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.988755 kernel: audit: type=1300 audit(1747096234.963:1464): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001f9daa0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.963000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001f9daa0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.995748 kernel: audit: type=1327 audit(1747096234.963:1464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:34.963000 audit[1928]: AVC avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.998655 kernel: audit: type=1400 audit(1747096234.963:1465): avc: denied { watch } for pid=1928 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:30:34.963000 audit[1928]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002aed4a0 a2=fc6 a3=0 items=0 ppid=1761 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c853 key=(null) May 13 00:30:34.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:30:35.264000 audit[5053]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:35.264000 audit[5053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd56d80b0 a2=0 a3=1 items=0 ppid=2254 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:35.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:35.273000 audit[5053]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:30:35.273000 audit[5053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd56d80b0 a2=0 a3=1 items=0 ppid=2254 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:35.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:30:35.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.75:22-10.0.0.1:44294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:35.699012 systemd[1]: Started sshd@19-10.0.0.75:22-10.0.0.1:44294.service. May 13 00:30:35.735000 audit[5056]: USER_ACCT pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.737606 sshd[5056]: Accepted publickey for core from 10.0.0.1 port 44294 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:35.737000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.737000 audit[5056]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc0f4c60 a2=3 a3=1 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:35.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:35.738899 sshd[5056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:35.742203 systemd-logind[1200]: New session 20 of user core. May 13 00:30:35.743288 systemd[1]: Started session-20.scope. May 13 00:30:35.745000 audit[5056]: USER_START pid=5056 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.746000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.857681 sshd[5056]: pam_unix(sshd:session): session closed for user core May 13 00:30:35.857000 audit[5056]: USER_END pid=5056 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.857000 audit[5056]: CRED_DISP pid=5056 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:35.860264 systemd[1]: sshd@19-10.0.0.75:22-10.0.0.1:44294.service: Deactivated successfully. May 13 00:30:35.861060 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:30:35.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.75:22-10.0.0.1:44294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:35.861613 systemd-logind[1200]: Session 20 logged out. Waiting for processes to exit. May 13 00:30:35.862204 systemd-logind[1200]: Removed session 20. May 13 00:30:40.862977 systemd[1]: Started sshd@20-10.0.0.75:22-10.0.0.1:44308.service. May 13 00:30:40.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.75:22-10.0.0.1:44308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:40.863857 kernel: kauditd_printk_skb: 19 callbacks suppressed May 13 00:30:40.863906 kernel: audit: type=1130 audit(1747096240.862:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.75:22-10.0.0.1:44308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:40.897000 audit[5072]: USER_ACCT pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.898208 sshd[5072]: Accepted publickey for core from 10.0.0.1 port 44308 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:40.899314 sshd[5072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:40.898000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.903931 kernel: audit: type=1101 audit(1747096240.897:1478): pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.903980 kernel: audit: type=1103 audit(1747096240.898:1479): pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.898000 audit[5072]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f12d60 a2=3 a3=1 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:40.909634 kernel: audit: type=1006 audit(1747096240.898:1480): pid=5072 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 13 00:30:40.909683 kernel: audit: type=1300 audit(1747096240.898:1480): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f12d60 a2=3 a3=1 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:40.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:40.911288 kernel: audit: type=1327 audit(1747096240.898:1480): proctitle=737368643A20636F7265205B707269765D May 13 00:30:40.911459 systemd-logind[1200]: New session 21 of user core. May 13 00:30:40.912284 systemd[1]: Started session-21.scope. May 13 00:30:40.915000 audit[5072]: USER_START pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.918000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.919573 kernel: audit: type=1105 audit(1747096240.915:1481): pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:40.922528 kernel: audit: type=1103 audit(1747096240.918:1482): pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:41.025774 sshd[5072]: pam_unix(sshd:session): session closed for user core May 13 00:30:41.026000 audit[5072]: USER_END pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:41.027943 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:30:41.028485 systemd-logind[1200]: Session 21 logged out. Waiting for processes to exit. May 13 00:30:41.028623 systemd[1]: sshd@20-10.0.0.75:22-10.0.0.1:44308.service: Deactivated successfully. May 13 00:30:41.029609 systemd-logind[1200]: Removed session 21. May 13 00:30:41.026000 audit[5072]: CRED_DISP pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:41.032861 kernel: audit: type=1106 audit(1747096241.026:1483): pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:41.032904 kernel: audit: type=1104 audit(1747096241.026:1484): pid=5072 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:41.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.75:22-10.0.0.1:44308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:46.030483 systemd[1]: Started sshd@21-10.0.0.75:22-10.0.0.1:34924.service. May 13 00:30:46.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.75:22-10.0.0.1:34924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:46.031901 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:30:46.031980 kernel: audit: type=1130 audit(1747096246.030:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.75:22-10.0.0.1:34924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:46.072000 audit[5104]: USER_ACCT pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.073062 sshd[5104]: Accepted publickey for core from 10.0.0.1 port 34924 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:46.074298 sshd[5104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:46.073000 audit[5104]: CRED_ACQ pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.079149 kernel: audit: type=1101 audit(1747096246.072:1487): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.079252 kernel: audit: type=1103 audit(1747096246.073:1488): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.081299 kernel: audit: type=1006 audit(1747096246.073:1489): pid=5104 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 00:30:46.073000 audit[5104]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcc035c0 a2=3 a3=1 items=0 ppid=1 pid=5104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:46.083276 systemd-logind[1200]: New session 22 of user core. May 13 00:30:46.084113 systemd[1]: Started session-22.scope. May 13 00:30:46.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:46.086025 kernel: audit: type=1300 audit(1747096246.073:1489): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcc035c0 a2=3 a3=1 items=0 ppid=1 pid=5104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:46.086079 kernel: audit: type=1327 audit(1747096246.073:1489): proctitle=737368643A20636F7265205B707269765D May 13 00:30:46.087000 audit[5104]: USER_START pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.091000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.094581 kernel: audit: type=1105 audit(1747096246.087:1490): pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.094635 kernel: audit: type=1103 audit(1747096246.091:1491): pid=5106 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.212803 sshd[5104]: pam_unix(sshd:session): session closed for user core May 13 00:30:46.213000 audit[5104]: USER_END pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.215240 systemd[1]: sshd@21-10.0.0.75:22-10.0.0.1:34924.service: Deactivated successfully. May 13 00:30:46.216099 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:30:46.216628 systemd-logind[1200]: Session 22 logged out. Waiting for processes to exit. May 13 00:30:46.217226 systemd-logind[1200]: Removed session 22. May 13 00:30:46.213000 audit[5104]: CRED_DISP pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.220612 kernel: audit: type=1106 audit(1747096246.213:1492): pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.220669 kernel: audit: type=1104 audit(1747096246.213:1493): pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:46.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.75:22-10.0.0.1:34924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:51.217957 systemd[1]: Started sshd@22-10.0.0.75:22-10.0.0.1:34932.service. May 13 00:30:51.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.75:22-10.0.0.1:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:51.218771 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:30:51.218820 kernel: audit: type=1130 audit(1747096251.217:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.75:22-10.0.0.1:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:30:51.255000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.256048 sshd[5120]: Accepted publickey for core from 10.0.0.1 port 34932 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:30:51.257387 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:30:51.256000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.262189 kernel: audit: type=1101 audit(1747096251.255:1496): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.262233 kernel: audit: type=1103 audit(1747096251.256:1497): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.264390 kernel: audit: type=1006 audit(1747096251.256:1498): pid=5120 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:30:51.256000 audit[5120]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb44bc30 a2=3 a3=1 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:51.266287 systemd-logind[1200]: New session 23 of user core. May 13 00:30:51.267121 systemd[1]: Started session-23.scope. May 13 00:30:51.268003 kernel: audit: type=1300 audit(1747096251.256:1498): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb44bc30 a2=3 a3=1 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:30:51.268093 kernel: audit: type=1327 audit(1747096251.256:1498): proctitle=737368643A20636F7265205B707269765D May 13 00:30:51.256000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:30:51.270000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.273000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.277204 kernel: audit: type=1105 audit(1747096251.270:1499): pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.277263 kernel: audit: type=1103 audit(1747096251.273:1500): pid=5122 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.397952 sshd[5120]: pam_unix(sshd:session): session closed for user core May 13 00:30:51.398000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.400410 systemd[1]: sshd@22-10.0.0.75:22-10.0.0.1:34932.service: Deactivated successfully. May 13 00:30:51.401277 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:30:51.401923 systemd-logind[1200]: Session 23 logged out. Waiting for processes to exit. May 13 00:30:51.398000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.402617 systemd-logind[1200]: Removed session 23. May 13 00:30:51.405270 kernel: audit: type=1106 audit(1747096251.398:1501): pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.405344 kernel: audit: type=1104 audit(1747096251.398:1502): pid=5120 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:30:51.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.75:22-10.0.0.1:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'